smart.gov.qa
Home
Search
Login
Search
Computers and Technology
Computers And Technology
College
HELP FAST!!Helena is creating a Python program to teach a younger sibling how to tell time. Helena begins by writing a very general pseudocode and then adds more elements to it. She reviews it and changes a few aspects. Which term describes the process that is being used? A. applicative process B. iterative process C. sympathetic process D. sequential process
Computers And Technology
High School
the hardware implementation of a program uses three different classes of instructions: 4 of class a, 2 of class b, and 3 of class c, that require 1, 1.5, and 2 cycles, respectively (table below). this program is run on processor cpu a which has a clock rate 4.8 ghz and processor cpu b that is 25% slower than cpu a. what is the cpi (cycles per instruction) for the program? what is the execution time for the program on cpu a? what is the clock cycle time of cpu b?
Computers And Technology
High School
portable n2o/o2 delivery systems contain all the necessary components housed together and can be moved from room to room for administration centralized n2o/o2 systems are built directly into the foundation of the dental office?
Computers And Technology
High School
describe an application security technology. discuss where it fits within the osi model and how it protects attacks from threats.
Computers And Technology
College
Computer 1 on network A, with IP address of 10.1.1.8, wants to send a packet to Computer 2, with IP address of 10.1.1.205. Taking in consideration that computer 1 is sending a FTP request to computer 2, and the source port on computer 1 is 21086, which of the following contains the correct information for the first TCP segment of data?
Computers And Technology
High School
When comparing and , what is the main difference? O The first symbol changes action, and the second symbol changes text. The first symbol is available in quick edit, and the second is not available in quick edit. The first symbol moves text, and the second symbol changes actions. O The first symbol is available in HTML, and the second is not available in HTML.
Computers And Technology
High School
hw3.11. relative error evaluation suppose in the year 2102 that evaluating for an input parameter becomes an important operation to do quickly. as such, cpu manufacturers want to approximate this operation in hardware using a single x86 operation, f p72. as a computer engineer, you are tasked with creating the necessary components to execute the f p72 instruction. suppose that the function f hat(x) carries out the f p72 instruction for a given floating point input x. that is, f hat(x) evaluates the approximation of . write a short program that evaluates the magnitude of the relative error in approximating using f hat for the input x. f hat(x) is a function that returns the approximation for a given floating point input x. store the magnitude of the relative error in using the approximation f hat in relative error. the setup code gives the following variables: name type description f hat function a function which has the same effect as the f p72 instruction x floating point number a floating point number your code snippet should define the following variables: name type description
Computers And Technology
College
Shows the nesting order of HTML tags based on the current selection or the current location of the intersection point
Computers And Technology
College
You have an Azure subscription that contains a storage account named storage1 and the following virtual machines:VM1 has a public IP address of 13.68.158.24 and is connected to VNET1/Subnet1VM2 has a public IP address of 52.255.145.76 and is connected to VNET1/Subnet1VM3 has a public IP address of 13.68.158.50 and is connected to VNET1/Subnet2The subnets have the following service endpoints:Subnet1 has a Microsoft.Storage service endpointSubnet2 does NOT have any service endpointStorage1 has a firewall configured to allow access from the 13.68.158.0/24 IP address range only.You need to identify which virtual machines can access storage1.What should you identify?Select only one answer.VM1 onlyVM3 onlyVM1 and VM2 onlyVM1 and VM3 onlyVM1, VM2, and VM3
Computers And Technology
High School
You are installing a 1.5 TB hard drive in a computer. What two methods could you use to partition the hard drive?Extended Partitioning Scheme (EPS)Master Boot Record (MBR)Standard Partition Layout (SPL)GUID Partition Table (GPT)BIOS (Basic Input/Output System)
Computers And Technology
High School
2) Browsers render web pages according to their own standards.TrueFalse
Computers And Technology
College
Why does TCP use a sequence number in the header?a. to reassemble the segments into datab. to identify the application layer protocolc. to indicate the number of the next expected byted. to show the maximum numbers of bytes allowed during a session
Computers And Technology
High School
21Select the correct answer from each drop-down menu.Antivirus software regularly scans your computer forIf any are found,
Computers And Technology
High School
universal containers (uc) recently implemented new sales cloud solutions. uc stakeholders believe that user adoption is best measured by the login rate. which two additional key metricsshould the consultant recommend? choose 2 answers
Computers And Technology
College
According to the USF Policy on Academic Integrity of Students (Links to an external site.)(Links to an external site) (Links to an external site.)which of the choices below is considered a LEVEL THREE violation.a.Failure to footnote or give proper acknowledgement in an extremely limited section of an assignment.b.Using a purchased term paper or other materialsc.Quoting directly or paraphrasing, to a moderate extent, without acknowledging the source.d.Submitting the same work or major portions of it to satisfy requirements of more than one course
Computers And Technology
College
All users at your site are using the bash shell. You want to set a variable that will apply to every user and always have the same value. Which of the following shell configuration files should you place this variable in?/etc/profile
Computers And Technology
High School
which data format type will increase the cell width instead of overlapping into empty cells?
Computers And Technology
College
The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission.a. simplexb. full-duplexc. half-duplexd. analoge. digital
Computers And Technology
High School
under the broad category of fee-for-service (ffs), what are the three main types of fee-for-service methodologies that were discussed in class?
Computers And Technology
High School
which feature of oop illustrated the code reusability? group of answer choices polymorphism inheritance encapsulation
Computers And Technology
College
The definition of software engineering that points to a multiperson construction of multiversion software is from:a. Ian Sommerville.b. the U.S. Department of Defense.c. Shari Pfleeger.d. the NATO conference.e. David Parnas.
Computers And Technology
High School
Client-based e-mail accounts require a special program called an e-mail client to be installed on your computer. True or False?
Computers And Technology
High School
what is the sequence of bed configurations at low froude numbers? 2. what is the sequence of bed configurations at high froude numbers?
Computers And Technology
High School
if you want to be a competent online communicator, why must you consider the issue of permanence in electronically mediated communication?
« Previous
Page 52
Next »