Answers on questions: Computers and Technology

Computers and Technology
nayeli47
23
What layer of the osi model describes how data between applications is synced and recovered if me...
Answer
Answers (1)
Computers and Technology
masonrocks71
21
What layer of the tcp/ip protocol model determines the best path through the network?
Answer
Answers (1)
Computers and Technology
jordabchilds
34
A network that is geographically dispersed and may use some form of public or commercial communic...
Answer
Answers (1)
Computers and Technology
nara
33
What is the software that finds websites webpages images and other information called?
Answer
Answers (1)
Computers and Technology
serenitykelly
26
Every character, number, or symbol on the keyboard is represented as a _____ in computer memory.
Answer
Answers (1)
Computers and Technology
jasminegodfrey
40
A windows firewall policy file has what file extension?
Answer
Answers (1)
Computers and Technology
CarmellaRustrian
13
What means can a worm use to access remote systems to propagate?
Answer
Answers (1)
Computers and Technology
Racebrayden
31
What does the ip address of 10.240.0.0 with a subnet mask of 255.255.255.0 represent?
Answer
Answers (1)
Computers and Technology
Dimpleface2
16
What are the odds of winning a jackpot on slot machines
Answer
Answers (2)
Computers and Technology
Petrilla685
39
Which type of password provides the highest level of permissions in bios?
Answer
Answers (1)
Computers and Technology
Luis220
29
In personal computers the operating system resides in what?
Answer
Answers (1)
Computers and Technology
ptran7
20
You can use the record navigation bar to _____.
Answer
Answers (1)
Computers and Technology
jazmincortez00
32
When configuring a vpn server to automatically assign ‚Äčip addresses to remote clients, how many i...
Answer
Answers (1)
Computers and Technology
Tombrello66
30
The ____ installation method is the least suitable method for a large volume of computers.
Answer
Answers (1)
Computers and Technology
yatziritg
17
What protocol's header would layer 4 device read and process?
Answer
Answers (1)
Computers and Technology
ALaNanita
41
The network services and facilities that users interact with are provided by
Answer
Answers (1)
Computers and Technology
Malachi11
13
A class named clock has two instance variables : hours (type int ) and isticking (type boolean )....
Answer
Answers (1)
Computers and Technology
achaz78
24
When messages to a remote web server are being lost for no apparent reason and you suspect the pr...
Answer
Answers (1)
Computers and Technology
JuneLorah722
16
Why would a server 2008 r2 dns server have a different security baseline than a windows xp client?
Answer
Answers (1)
Computers and Technology
tommyjr
31
When you enter search keywords in the search box of file explorer and the onedrive option is sele...
Answer
Answers (2)
Computers and Technology
nathalia22
26
A mismatch between the type of printer connected to a system and the software printer driver inst...
Answer
Answers (1)
Computers and Technology
olivianatasha
19
Syntax errors are caught only when a program executes.
Answer
Answers (1)
Computers and Technology
Bernarda174
24
If a protocol is routable which tcp/ip layer does it operate at\
Answer
Answers (1)
Computers and Technology
sfdyyvgeyf
54
In object-oriented programming, ________ allows a new class to automatically use all the data and...
Answer
Answers (1)
Computers and Technology
MellissaGoldenman
67
Web-based application software is software that ________.
Answer
Answers (1)