QuestionOwl
Search
Sign In
Ask Questions
Join now
Sign In
Computers and Technology
Nick has chosen to hide a worksheet that contains sensitive data representing information from his workbook. Which statement is correct? A. The worksheets that are hidden will retain data, but references to those worksheets will no longer function. B. The worksheets that are hidden will have their data removed C. The worksheets that are hidden will retain their data, and references will continue to function as normal. D. Do you have to unhide the worksheets to make references function correctly.
How are a cell's content and format related? A)They are independent and not related. B)The content and format are the same C)Changing the format affects the content
Draw an E-R diagram for the following situation: A laboratory has several chemists who work on one or more projects. A project may involve one to many chemists. Chemists may also use certain kinds of equipment on each project. Attributes of CHEMIST include Employee_ID (identifier), Name, and Phone_no. Attributes of PROJECT include Project_ID (identifier) and Start_Date. Attributes of EQUIPMENT include Serial_no. and Cost. The organization wants to record Assign_Date – that is, the date when a chemist is assigned to a specified project.
The power supply or laptop DC adapter converts the wall outlet DC power into AC power True or false?
Computers are said to use binary data because all computer data is simply a series of Os and 1s. True False
tell me something about "nuclear power station" (help)
Enter the letter of the correct answer to host your own game server on your network and make it available to friends on the Internet; you may want to set up a ______. A) DNS B) DMZ C) DHCP D) Firewall
Which statement is false? A. Insertions and deletions are made only at one end of a queue, its tail. B. Linked lists are collections of data items "lined up in a row"-- insertions and deletions can be made anywhere in a linked list. C. Binary trees facilitate high-speed searching and sorting of data. D. Insertions and deletions are made only at one end of a stack, its top.
_____ occurs when a social network user clicks a link and enables malware to post unwanted links on their page. A) Adware B) Phishing C) Clickjacking D) Malicious script scams
Technician A says you should use bolts and rubber bands above a cylinder to catch a piston. Technician B says you should place protective covers on the rod bolts to protect the rod journal. Who is correct?
121 - 130 of 668
Prev
1
...
11
12
13
14
15
...
67
Next