GuideFoot - Learn Together, Grow Smarter. Logo

Questions in computers-and-technology

📝 Answered - What is a bridge between two networks? A. Gateway B. MAC Address C. Protocol D. IP Address

📝 Answered - Fill in the blanks: _____ are referred to as document in MS-Word. Changing the appearance of the text is called _____ _____ means the manner in which the characters appear. _____ makes the text in slanting position.

📝 Answered - Which are three benefits of using the Fusion Cloud Integration Cloud for custom code creation and maintenance? Options: * FUSION supports external integration using REST services to bring your custom code into the Oracle Cloud Ledger. * FUSION provides the end experience with an integration to make sure the data is displayed the way the customer wants. * FUSION is used for single or bulk reference number of code. * FUSION uses the spreadsheet to view only and display reference code in the UI. * FUSION can be used to build a custom, updated, and secure custom reference code.

📝 Answered - What version of the iPad mini was announced in 2013? A) iPad Air B) iPad Water C) iPad Earth D) iPad Fire

📝 Answered - Which shortcut in Windows allows you to cut? A. F10 B. Ctrl+X C. Alt+Spacebar D. F5

📝 Answered - Select the icon of subscript: X² X2 Aa U

📝 Answered - Convert the following CFGs to PDA: S → aA A → aABC | bB | a B → b C → c

📝 Answered - Answer the following questions. 1. Who invented the abacus? What was its purpose? 2. What are the main features of fifth-generation computers? 3. What are mainframe computers and where are they used? 4. Name five areas where supercomputers are used. 5. What were the problems in first-generation computers? Differentiate between the following. 1. Laptop and Desktop 2. Laptop and Notebook 3. Supercomputer and Mainframe computer

📝 Answered - Which statement describes the concept of cryptographic hashing? Choose one of the following. 1. It verifies data integrity by creating a unique fingerprint of the data. 2. It is a reversible process that allows retrieval of the original data. 3. It encrypts data to prevent unauthorized access. 4. It is a way to compress data to save storage space.

📝 Answered - What should Justin do in this instance? Select one: A. Pay the ransom, then notify his security officer of the potential cyber attack. B. Do not pay the ransom; notify his security officer of the potential cyber attack immediately. C. Pay the ransom; he needs to access his files to be able to complete his work. D. Shut down the computer; this must be a temporary attack and he knows to shut down in the event of an attack