Not all computers can be affected by spills,some computers are spill proof. True False
Software do not require updates, once you install a software/application, you are set. True False
What if your computer does not have ability to connect to WiFi what can you do? Select all that apply Use an internet cable Use a WiFi Adapter Buy another computer Get it Serviced
Select the correct answer from each drop-down menu. Which tool performs the features described in the text? The square is a free-form selection tool. You can use the square tool to darken areas of the image. square marquee lasso
A smart thermostat can accomplish which of the following? Select all that apply. A. detect room occupancy B. receive instructions from a smartphone app C. unlock your front door D. adjust room temperature based on the weat outside
Which of the following are good practices when making passwords Select all that apply.
Which of the following are clues that a phone call may be a voice phishing attack?Select all that apply.
Vivian just received a voicemail asking for her username and password, in order for the IT department to add new software to her computer. What should she do?
13. In a communication system which among the following convert messages into packets that can travel across the communication channel? Connection devices Sending and receiving devices Storage devices Secondary devices
A user-defined type is defined in terms of a __ type. complex simple built-in base
What is the primary purpose of a search engine? To create websites To store files on the internet To help users find information on the internet
Which of the following signals transmits information more reliably? digital analog
What role do you think AI will play in future space exploration?
Which logging feature captures events from multiple network devices into a centralized server? SNMP traps NetFlow Ping probes Syslog
Which term refers to having a device or system that can take over in the event of a failure? A Disaster recovery B Redundancy C High availability D Scalability
Exercice 2 : Les requêtes simples. On considère une table ETUDIANTS avec les champs : matricule, Nom , Prénom Age, Filière. Question : 1. Ecrire une requête SQL pour afficher tous les étudiants. 2. Ecrire une requête pour afficher les étudiants de la filière scientifique. 3. Ecrire une requête pour afficher les étudiants âgés de plus de 18 ans. 4. Ecrire une requête pour afficher seulement Nom et prénom.
Complete the sentence. The most commonly used data container in Python is a $\square $ list
Which of these is an example of an adaptive technology? (1 point) a text-to-speech function on an e-book reader a cloud-basec database a customer service chatbot cognitive offloading software
Which of the following statements would clear the text displayed in a Label control named cityLabel? $cityLabel.Text=''clear'';$ $cityLabel.Text=''none'';$ $cityLabel.Text=''empty'';$ Clear my selection
Question 5 Which type of file is commonly used by trusted websites to create installation software for mobile devices? EXE file APK file BAT file SYS file