smart.gov.qa
Home
Search
Login
Search
Computers and Technology
Computers And Technology
High School
you are a security administrator working for a hotel chain. you have a new member of staff who has started as a systems administrator, and she will need full access to the aws console. you have created the user account and generated the access key id and the secret access key. you have moved this user into the group where the other administrators are, and you have provided the new user with their secret access key and their access key id. however, when she tries to log in to the aws console, she cannot. why might that be?
Computers And Technology
College
CHANGES IN THE TECHNOLOGICAL ENVIRONMENT INCLUDE THE EMERGENCE OF INFORMATION TECHNOLOGY THAT INCLUDES SUCH TOOLS AS:1. the internet2. jackhammers3. cell phones4. computers
Computers And Technology
College
Lab2C: For this assignment, create a program that will read ia width and heightLab2E othe area and perimeter of a rectangle. The formula for perimeter is P = 2*(height+wiath)cae as formula for area is A= (height"width), Format the oulpiAs following this sample run. User.input is in bold. Both the class and filename should Pe called Lab2C (java, .cS,cpp).from the user andSample runenter a width: 4Enter a heighthe area is 328The perimeter is 24
Computers And Technology
College
The developers of a music-streaming application are updating the algorithm they use to recommend music to listeners. Which of the following strategies is LEAST likely to introduce bias into the application?Making recommendations based on listening data gathered from a random sample of users of the application
Computers And Technology
College
assume that numlist has been initialized with the following integer objects: [5, 7, 8, 12]. which of the following shows the values in numlist after a call to mystery(11)?
Computers And Technology
College
2 points question at position 22 an ip address is composed of 48 bits that are grouped together into 8-bit octets and are represented by a decimal number from 0 to 255. true or false
Computers And Technology
College
exercise 3 (decompress vector test: 2 points). complete the function decompress vector(d) that takes a compressed vector d, which is a dictionary with keys for the indices (inds) and values (vals), and returns the corresponding full vector. for any repeated index, the values should be summed. the function should accept an optional parameter, n, that specifies the length of the full vector. you may assume this length is at least max(d['inds']) 1.
Computers And Technology
High School
what is displayed as a result of executing the code segment?
Computers And Technology
College
Hands washing should last a minimum of 15 second true or false
Computers And Technology
College
What conclusions can you draw about how to properly get information from the user and about when you do and do not need to typecast the variables when used in the print() function?
Computers And Technology
High School
ASAP!!Choose the answer that makes the sentence true.A function ______A. does not use parameters B. can only have one parameter C. can have zero to many parameters
Computers And Technology
College
A program is designed to determine the minimum value in a list of positive numbers called numList. The following program was writtenWhich of the following can be used to replace so that the program works as intended for every possible list of positive numbers?A. 0B. 1000000C. numList.lengthD. numList[0]
Computers And Technology
College
You are designing a multi-tiered application that will be hosted on Azure virtual machines. The virtual machines will run Windows Server. Front-end servers will be accessible from the Internet over port 443. The other servers will NOT be directly accessible over the Internet.You need to recommend a solution to manage the virtual machines that meets the following requirement:Allows the virtual machine to be administered by using Remote Desktop.Minimizes the exposure of the virtual machines on the Internet.Which Azure service should you recommend?Select only one answer.Azure BastionService EndpointAzure Private LinkAzure Front Door
Computers And Technology
College
You have Azure subscription that includes virtual network named VNet1 in West US region.You plan to deploy following container instances:Instance1, running Windows container image in West US regionInstance2, running Linux container image in West US regionInstance3, running Windows container image in East US regionWhich container instances can be connected to VNet1?Select only one answer.Instance1 onlyInstance2 onlyInstance1 and Instance2 onlyInstance1 and Instance3 onlyInstance1, Instance2 and Instance3
Computers And Technology
College
Managing information systems in modern organizations is a difficult and complex task. Which of the following factors does NOT contribute to this?O Business people are customers of the IT department.O Technology is getting cheaper to acquire, operate, and maintain.O If technology is not working, many firms cannot function.O Both end users and IT employees have responsibility for systems.
Computers And Technology
College
How to input out smaller cars get better gas mileage tiny cars get great fuel
Computers And Technology
High School
What is the most advanced warehouse inventory management software?
Computers And Technology
College
Intro to JAVA Please see below:Write a program that reads in the first and last name of a person and prints the last name, followed by a comma, a space, and the first name. For example:Please enter your first and last name: Harry MorganMorgan, HarryCODE BELOW:import java.util.Scanner;public class Name{public static void main(String[] args){Scanner in = new Scanner(System.in);System.out.print("Please enter your first and last name: ");// Read in the first and last name// Print the last name, a comma, a space, and the first nameSystem.out.println(......);}}
Computers And Technology
College
which of these is true of layout decisions in operations system design?multiple choice question.layouts tend to negatively affect worker morale.layouts can be implemented in a short time framelayout decisions require substantial monetary investments
Computers And Technology
College
write a program that outputs radius is followed by the value of hemisradius to three digits after the decimal point. on the next line, the program outputs volume is followed by the value of hemis volume to seven digits after the decimal point. end with a newline.
Computers And Technology
College
which of the following is a good practice for controlling computer access? picking strong passwords and protecting them appropriately. leaving the device on and unlocked to make sure the work team members can use the device when you are at lunch. logging into systems with a shared user-id or password. storing access tokens in a central unlocked location.
Computers And Technology
College
1.4.3 manage files next resource listen to simulation instructions to help pay your way through your sophomore year in college, you are working part time at a local business. the owner of the business is allowing you to use the company laptop on which to do your school work. your major requires you to take latin 101 and you want to create and organize a few goals for this course. in this lab, your task is to: create a new folder named latin 101 in the documents folder on your computer. copy the d:\course goals template.docx file to the documents\latin 101 folder. rename documents\latin 101\course goals template.docx to documents\latin 101\latin 101 goals.docx.
Computers And Technology
High School
Input Sanitisation and SQL injections question. What is meant by the term Input Sanitisation and how can it prevent SQL injections? Explain your answer in full.
Computers And Technology
High School
wireless wearable fitness devices are authorized within scifs. True or False?
« Previous
Page 39
Next »