Cloud computing is the technology that will enable James to access a certain software service over Internet and provide software on demand.
Cloud computing delivers shared pool of configurable computing resources and allows customers to acquire resources at any time and then delete them the instant they are no longer needed. This technology besides the fact that it provides on-demand self-service , it encompasses the characteristics of grid computing and the characteristics of utility computing.
Why isn't 802.1X a good choice for home based wireless networks
In an ip address such as 72.44.192.233, the last number in the address (on the far right) identifies:
The set of communications rules for exchanging information electronically on the internet is called the ________.
What type of engine is common on boats designed for shallow water?
When you connect to your isp's pop, the isp and the equipment at the pop go through a process called _________, establishing the speed of the internet connection, and then proceed to _________?
Which adapter card in a pc would provide data fault tolerance?
The ____ property configures a shadow effect on the text displayed within an element
Search engines that search other search engines are called
Answer:
Explanation:Um Search engines I'm playing metasearchengines
Which one of the following may be used as an input as well as an output device? A. Fax machine B. Scanner C. Printer D. Voice recognition
LOOK TO THE LEFT AND RIGHT BEFORE ENTERING ANY INTERSECTION ON A GREEN LIGHT BECAUSE:
A. Other vehicles might enter the intersection against a red lightB. Once you are in the intersection, you must only look straight aheadC. Cross traffic may have a green arrowD. Pedestrians on the cross street have the right-of-way
what feature of excel allows you to automatically calculate common formulas which select data
In an ipv4 address, what are the maximum number of bits that can be used to identify the network address
QUICK TRUE/FALSE QUESTION
A Uniform Resource Locator (URL) is how the internet knows where to take users when an address is typed into a browser.
True or False
Answer:
True
Explanation:
The URL is a unique resource used to locate the resource on the internet. This is commonly known as the web address. The web address consists of many parts: the protocol identifier and the IP address of the computer.
URL protocols consist of the Hypertext Transfer Protocol (HTTP) or the HTTP for secure browsing and email communication. The URL specifies the following about a website:
path to a specific page
network port used to make the connection
specific reference point, e.g. HTTML
and
query of search information, e.g a website extension.
The URL is important to identify and distinguish between true and malicious sites.
Which feature in word automatically corrects typos, minor spelling errors, and capitalization as you type? autocomplete spelling and grammar autocorrect autotype?
Is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely?
Pan-os 7.0 introduced a new security profile type. what is the name of this new security profile type?
Name two properties that a button object can possess?
A(n) ____ window is an open window hidden from view but that can be displayed quickly by clicking the window's app button on the taskbar.â
Answer:
The correct answer is: minimized.
Explanation:
When a window is active (the corresponding button is selected in the taskbar), clicking on its button in the taskbar minimizes the window. This means that the window disappears from the desktop. When a window is minimized, its content is not closed or deleted, it is simply temporarily removed from the desktop. In the previous image; are minimized, Excel and Windows Media Player but are still running, as their respective buttons appear in the taskbar. You can also minimize a window by clicking the Minimize button located in the upper right corner of the window.
To restore a minimized window - that is, to display it again on the desktop - click its button on the taskbar. For more information about these buttons, see Windows help and support.
How do you know when a spreadsheet object is active in a Word document? A. The Ribbon is minimized. B. The Excel Formula bar is displayed. C. The Word icon in the taskbar is selected. D. The Office Clipboard task pane is open.
Answer:
B The Excel Formula bar is displayed
Explanation:
To know if the spreadsheet is active in a word document, the excel formular bar is displayed. when you are done click outside of the spreadsheet and word is resumed or click inside the spreadsheet to resume editing the spreadsheet. This feature allows one to be able to create a spreadsheet in a word document, useful in creating business reprts.
The ____ keyword specifies that a function or method does not return a value.
What folder is used to store offline files and folders managed by the offline files utility?
____ are diagrams used in mathematics and logic to help describe the truth of an entire expression based on the truth of its parts.
Although this technology-based practice can be helpful in some contexts, experts conclude that if students use it before using a search engine, it can significantly degrade the effectiveness of the search.
You observe a small plaque on an electrical appliance that reads, in part, "115 volts AC 60 Hz." This means that the appliance A. contains a heating element. B. may be operated with batteries. C. produces special safety hazards. D. must be operated on alternating current.
The general term for an object that receives notifications of user actions is
A query is a request for the database management software to search for data that matches specific criteria.
a. True
b. False
"the ____ bar contains five buttons used to accomplish various tasks on the computer related to organizing and managing the contents of the open window."
Which dos attack tool, that is based on the dos operating system, sends out fragmented ip packets and can be used to target windows systems and network devices, such as cisco routers?
Denial-of-service (DoS) attacks usually flood servers, systems or networks with high traffic in order to engulf the victim resources and make it impossible for legitimate users to use them. This results to crashing the server. In this case, a tool used to attack windows servers and network devices in fragmented ip packets form is called “Jolt2”.
Answer: Jolt2
What is the important safety information found on a boat's capacity plate?
A student sits down at a computer and presses the power button. the computer does not turn on. what is a logical explanation as to why the computer does not work? how would the student test that idea?