HRS - Ask. Learn. Share Knowledge. Logo

Questions in computers-and-technology

[Done] McAfee primarily makes what kind of software? A. Security B. Networking C. Systems Performance D. Contact Management

[Done] What is the type of the following Binary Tree? Apply preorder and postorder traversals on the following tree. 9 / \ 6 12 / \ \ 5 11 15 \ / 8 13 / 14

[Done] Which of the following is not used to create an object in Java? A. By new keyword B. By newInstance() method C. By clone() method D. By factory method etc. E. By clear

[Done] What are the possible outcome(s) executed from the following code? Also specify the maximum and minimum values that can be assigned to variable PICK. ```python import random PICK = random.randint(0, 3) CITY = ["DELHI", "MUMBAI", "CHENNAI", "KOLKATA"] for I in CITY: for J in range(1, PICK): print(I, end="") print() ``` (i) DELHIDELHI MUMBAIMUMBAI CHENNAICHENNAI KOLKATAKOLKATA (ii) DELHI DELHIMUMBAI DELHIMUMBAICHENNAI (iii) DELHI MUMBAI (iv) DELHI MUMBAIMUMBAI

[Done] Which of the following statements most accurately describes secret gists? A. Anyone can see the gist from the gist Discover page. B. Secret gists require GitHub Enterprise. C. Anyone with the URL for the gist can view the gist. D. Users with assigned access can view the gist.

[Done] What is the small plastic disc used to store data called? A. USB-C B. Compact disc C. USB D. Flip disc

[Done] A file placed on a computer's hard disk drive by websites the user has visited is called a A. cookie B. firewall C. cache D. bookmark

[Done] Unauthorized computer intrusion is known as: Select one: A. phreaking B. pharming C. hacking D. phishing

[Done] What is one of the current limitations of quantum computing technology? Choose one of the following. A. Requirement for high gravity and high-temperature environments B. An inability to perform basic arithmetic operations efficiently C. A requirement for extremely specialized hardware and knowledge D. An inability to connect to traditional computer networks

[Done] What is the purpose of hashing? Choose one of the following. a) to perform calculations on pieces of data b) to securely export data from a distributed ledger c) to allow administrators to input data more easily d) to indicate if data has been tampered with