Askhoma
Home
Search
Register
Login
Search
Computers and Technology
Computers And Technology
College
I connected to an external hard drive to transfer some photos from my vacation. When I try to drag the photo, it bounces right back and does not transfer. What is the likely cause of this issue? a. hard drive is full b. photos were taken in a different country c. USB port is broken d. the file structure of the 2 hard drives are not compatible
Computers And Technology
High School
How is IT used in entertainment to make cartoon movies
Computers And Technology
College
Create a class, CallClass, with two methods to show call by value and call by reference. One method has two parameters that are any primitive types, whereas the other has a parameter that is an object of any class. Create a CallClassTest class that calls the two methods with proper arguments to show call by value and call by reference. You do not need to read the values of parameters from the screen. (5 pts)
Computers And Technology
College
As the first step, load the dataset from airline-safety.csv by defining the load_data function below. Have this function return the following (in order): 1. The entire data frame 2. Total number of rows 3. Total number of columnsdef load_data(): # YOUR CODE HEREdf, num_rows, num_cols
Computers And Technology
High School
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future
Computers And Technology
High School
Based on the code you created in this Unit, propose a way to re-use most of the code (with different information in the variables like "city" and "rates") for a part of a similar app that isn't related to parking at all. The app can be small-scale or large scale, but should be clearly connected to the code you've written (you can defend your proposal if the connection is not immediately obvious).
Computers And Technology
High School
What is self management.
Computers And Technology
College
Argue whether we can infer anything about a candidates ability to work in a professional environment based on his or her resumes formatting.Compare how you would address a resume with wacky fonts to how you would respond to grammatical errors in a resume.
Computers And Technology
College
There must be security policies in place to set core standards and requirements when it comes to encrypted data.a. Trueb. False
Computers And Technology
College
Company A has a project plan for a new product under development. The product will be one of many released in the coming year. The plan, if disclosed, might give Company A's competition a market advantage. Which ISO 27002 classification level is most likely assigned to this document?a) Public Documentsb) Proprietaryc) Highly Confidentiald) Top Secret
Computers And Technology
College
The Lisp function LENGTH counts the number of elements in the top level of a list. Write a function ALL-LENGTH of one argument that counts the number of atoms that occur in a list at all levels. Thus, the following lists will have the following ALL-LENGTHs. (A B C) => 3((A (B C) D (E F)) => 6(NIL NIL (NIL NIL) NIL ) => 5
Computers And Technology
College
A hierarchy chart can be helpful for a. planning the functions of a program b. naming the functions of a program c. showing how the functions of a program relate to each other d. all of the above e. a and c only
Computers And Technology
High School
Which vendor owns the software platform Fusion?A. MicrosoftB. AppleC. SAPD. Oracle
Computers And Technology
College
While troubleshooting an Internet connection problem for your network, you restarted the modem and then the router. The router is now communicating with the Internet, which you can confirm by observing the blinking light on the router's WAN indicator. However, now your laptop is not communicating with the router. Order the commands below to fix the problem and confirm connectivity.a. pingb. ipconfig /renewc. nslookup microsoft.comd. ipconfig /release
Computers And Technology
High School
A program in the cyberspace and intercept messages containing specific text A. Virus B. Sniffers C. Worm D. Bomb
Computers And Technology
College
A red team initiated a DoS attack on the management interface of a switch using a known vulnerability. The monitoring solution then raised an alert, prompting a network engineer to log in to the switch to diagnose the issue. When the engineer logged in, the red team was able to capture the credentials and subsequently log in to the switch. Which of the following actions should the network team take to prevent this type of breach from reoccurring? A. Encrypt all communications with TLS 13 B. Transition from SNMPv2c to SNMPv3 with AFS-256 C. Enable Secure Shell and disable Telnet D. Use a password manager with complex passwords
Computers And Technology
High School
What is the primary difference, if any, between a web master and a web producer? While a web master maintains a companys websites, the web producer maintains a companys entire web-based system. While a web producer maintains a companys websites, the web master maintains a companys entire web-based system. While a web master maintains a companys web presence, the web producer maintains all technology at a company. While a web producer maintains a companys web presence, the web master maintains all technology at a company.
Computers And Technology
College
An organization needs to integrate with a third-party cloud application. The organization has 15000 users and does not want to allow the cloud provider to query its LDAP authentication server directly. Which of the following is the BEST way for the organization to integrate with the cloud application?a. Upload a separate list of users and passwords with a batch import. b. Distribute hardware tokens to the users for authentication to the cloud c. Implement SAML with the organization's server acting as the identity provider. d. Configure a RADIUS federation between the organization and the cloud provider
Computers And Technology
College
Fit a boosting model to the training set with Purchase as the response and the other variables as predictors. Use 1,000 trees, and a shrinkage value of 0.01. Which predictors appear to be the most important
Computers And Technology
College
Which factors are involved in search engine optimization
Computers And Technology
High School
Software that tries to monitor and track the way you use your computer.
Computers And Technology
College
What does the statement that follows do? double gallons[6] = { 12.75, 14.87 }; a. It assigns the two values in the initialization list to the first two elements but leaves the other elements with the values currently in memory. b. It assigns the two values in the initialization list to the first and second elements, third and fourth elements, and fifth and sixth elements. c. This statement is invalid. d. It assigns the two values in the initialization list to the first two elements and default values to the other elements.
Computers And Technology
College
Book information (overriding member functions) Given main() and a base Book class, define a derived class called Encyclopedia. Within the derived Encyclopedia class, define a PrintInfo() function that overrides the Book class' PrintInfo() function by printing not only the title, author, publisher, and publication date, but also the edition and number of volumes. Ex. If the input is: The Hobbit J. R. R. Tolkien George Allen & Unwin 21 September 1937 The Illustrated Encyclopedia of the Universe James W. Guthrie Watson-Guptill 2001 2nd 1 the output is: Book Information: Book Title: The Hobbit Author: J. R. R. Tolkien Publisher: George Allen & Unwin Publication Date: 21 September 1937 Book Information: Book Title: The Illustrated Encyclopedia of the Universe the output is: Book Information: Book Title: The Hobbit Author: J. R. R. Tolkien Publisher: George Allen & Unwin Publication Date: 21 September 1937 Book Information: Book Title: The Illustrated Encyclopedia of the Universe Author: James W. Guthrie Publisher: Watson-Guptill Publication Date: 2001 Edition: 2nd Number of Volumes: 1 Note: Indentations use 3 spaces. LAB ACTIVITY 11.14.1: LAB: Book information (overriding member functions) File is marked as read only Current file: main.cpp cin >> numVolumes; main.cpp Book.h 25 26 27 28 29 30 31 32 33 34 35 36 myBook. SetTitle(title); myBook. SetAuthor(author); myBook. SetPublisher(publisher); myBook.SetPublicationDate(publicationDate); myBook.PrintInfo(); Book.cpp Encyclopedia.h myEncyclopedia. SetTitle(eTitle); myEncyclopedia. SetAuthor(eAuthor); myEncyclopedia. SetPublisher(ePublisher); myEncyclopedia. SetPublicationDate(ePublicationDate); Encyclopedia.cpp
Computers And Technology
College
All of the following are true of using the database approach to managing data except Group of answer choices Decentralized management of data Minimal data redundancy Data integration and sharing
« Previous
Page 3
Next »