How many significant digits does a double variable have?
a. 7.
b. 8.
c. 14.
d. 15.
d. 15.
Computer Science & Information Technology
You might also like to view...
What is the purpose of the task list?
What will be an ideal response?
Computer Science & Information Technology
List the dependent tasks and the independent tasks for cooking a meal.
What will be an ideal response?
Computer Science & Information Technology
Ann a security administrator wants a limit access to the wireless network. Which of the following can be used to do this without using certificates?
A. Employ EPA-TLS B. Employ PEAP on all laptops C. Enable MAC filtering D. Disable SSID broadcasting
Computer Science & Information Technology
Which of the following services would Kim, a technician, use to create or update a client's DNS 'A' and 'PTR' records automatically?
A. Kerberos B. BIND C. WINS D. DHCP
Computer Science & Information Technology