smart.gov.qa
Home
Search
Login
Search
Computers and Technology
Computers And Technology
College
Given a string on one line and a second string on the second line, output the index where the second string starts in the first string Ex: If the input is: Fuzzy bear zy the output is: 3 Note: Using a pre-defined string function, the solution can be just one line of code. 1 #include 2 #include 3 using namespace std; 5 int main() { 6 string strVar; 7 string subString; 8 9 getline(cin, strVar); 10 cin >> subString; 11 12 return 0; 13 }
Computers And Technology
College
according to the text, subsetting can also be used to eliminate unwanted data such as: select all that apply!
Computers And Technology
College
you are connecting a laptop to a brand new digital high definition tv. unfortunately, the laptop is a little outdated and only has an analog display output. which of the following adapters could you use to convert the signal from analog to digital for use with the new television?
Computers And Technology
High School
In a DTP project, Fiona is looking for a way to make a page layout attractive to readers. Help Fiona pick the correct word to complete the sentence
Computers And Technology
College
An engineering teams new work project will shortly be bursting with many types of files and sub-project files. The team wants to be able to easily find the project files. What should it do to have the best organizational method for the projects files?
Computers And Technology
High School
assume you have a variable sales of type money, where money is a structure type with two int fields, dollars and cents. write a statement that reads two integers from the keyboard, a dollar amount followed by a cents amount, and stores these values in the appropriate fields in sales.
Computers And Technology
High School
cisco asa forwards packets based on different parameters when running in routed and transparent mode. on which parameter is the packet forwarding process on cisco asa running in transparent mode based on?
Computers And Technology
College
which of the following statements is applicable for a peer-to-peer network and not for a client-server network model? group of answer choices problems on the network can be monitored, diagnosed, and fixed from one location. they are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce.
Computers And Technology
College
What is the purpose of Switch here? And, why are there two switches?
Computers And Technology
High School
your organization has several mac and windows laptops that all access data on a file server on the local network. which file system on the linux file server is best suited to this situation, and how do you best set it up?
Computers And Technology
High School
write a declaration for a variable salesannual of type money (a structure with two int fields, dollars and cents) and initialize it to represent $1,325,023.47.
Computers And Technology
College
People design computers and machines to assemble them. Gas is then used to transport the finished computers to stores. Select the factors used in producing computers.Human resourcesHealthCapital goodsNatural resources
Computers And Technology
High School
3. 5 Lesson Practice Quiz: Edhesive Question 1. The answer is : A Im helping students who doesnt know the answer for this
Computers And Technology
College
which of the following definitions best matches the concept of an account from a security standpoint? group of answer choices an arrangement in which a person may use computer or network services a record or statement of financial expenditure and receipts relating to a particular purpose a report or description of an event or experience to consider or regard in a specified way
Computers And Technology
College
contains additional hardware information when there are values in hkey local machine such as two different monitors
Computers And Technology
High School
Explain iso c++ forbids comparison between pointer and integer
Computers And Technology
High School
a network contains multiple vlans spanning multiple switches. what happens when a device in vlan 20 sends a broadcast ethernet frame?
Computers And Technology
College
Which of the following is an advantage of a centralized information security organizational structure?It is easier to promote security awareness.It is easier to manage and control.It is more responsive to business unit needs.It provides a faster turnaround for security requests.
Computers And Technology
High School
c. what is the smallest positive number that can be stored in an ieee-754 double-precision floating point value?
Computers And Technology
College
the five number summary of a dataset is given as 1, 3, 7, 13, 19 an observation is considered an outlier if it is below 1 incorrect. an observation is considered an outlier if it is above 19 incorrect.
Computers And Technology
High School
83) according to the correct procedure to allow a substitution, is it always necessary for a substitute to enter the field of play for the substitution to be completed?
Computers And Technology
High School
you are making ethernet drop cables using cat5e cables and rj45 connectors. you need to remove the plastic coating over the cable to expose the individual wires. which tool should you use?
Computers And Technology
College
holt computer services purchased $2,000 of new equipment and paid immediately. illustrate how to record the transaction of holt services by completing the following sentence.- The equipment would be debited on the left side of the T Account and cash account would be credited in the right side of the T Account
Computers And Technology
High School
3.20.9: sorting signed integers. for each question, assume radix sort has sorted integers by absolute value to produce the array (-12, 23, -42, 73, -78), and is about to build the negative and non-negative buckets to complete the sort. 1) what integers will be placed into the negative bucket? type answer as: 15, 42, 98
« Previous
Page 76
Next »