1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bixtya [17]
1 year ago
13

What is the official name of an application on a desktop or a laptop?.

Computers and Technology
1 answer:
Lerok [7]1 year ago
8 0

Answer:

the official name of an application on a desktop is desktop application

You might be interested in
According to the author, there are five hedging strategies organizations can pursue. One of them is: Select one: a. commit with
Kitty [74]

Answer:

The correct answer is letter "A": commit with fallback.

Explanation:

American Professor Alfred A. Marcus (born 1950) in his book "<em>The Future of Technology Management and the Business</em>" (2015) describes that hedging may be a strategy to shield businesses from the rapidly evolving world they face as a result of the continuous implementation of technology in the market. According to Marcus, there are 5 hedge approaches that firms should implement:

  1. Gamble on the most probable:<em> work on the product with the highest success rate. </em>
  2. Take the robust route: <em>invest in as many products as possible. </em>
  3. Delay until further clarity emerges:<em> waiting for a proper moment to react in front of market changes. </em>
  4. <u>Commit with a fallback</u>:<em> adapt according to the market. </em>
  5. Try to shape the future:<em> innovate.</em>
7 0
3 years ago
Suppose you with had two algorithms, A and B, with growth functions fa(n)=200n2 and fb(n)=2n4. If you were to do an exact analys
anyanavicka [17]

Answer:

For values when n<32 use fb(n) else use fa(n).

See explaination for details

Explanation:

Earlier when n=1 fa(n)=2000 while fb(n)=2. for n=2 fa(n)=2000*22 =2000*4=8000 while fb(n)=2*24=2*16=32. It is observed that fa(n) requires more time than fb(n) for small values.

Now, we will see when fb(n) crosses fa(n). This can happen only when fb(n) values equals or greater than fa(n)

therefore,

2000n2<=2n4

Solving equation we get n2>=1000 which can happen when n>=32.

So for values when n<32 use fb(n) else use fa(n)

7 0
3 years ago
PACIFIC NORTHWEST
poizon [28]

Answer:

b) Tufts University Nutrition Web Page

Explanation:

The site that most likely provides a balanced information on eating a balanced diet is the Tufts University Nutrition Web Page

Tufts University is a moderate size, leading private research American higher education institution located in Massachusetts that offers degree programs on Food and Nutrition Policy and Programs

By comparison with the other sites which are;

a) Pork Producers Nutrition Page, which is expected to be related with pork production pork producers and pork consumers, based on the title focus, the information provided by the page is therefore, not meant for general use and therefore not meant to be balanced

c) The Eat What You Want Page, based on the of the page title literally which suggest the liberty for a user to eat what they want to eat does not appear to call for the input of an expert advice on nutrition, and therefore is not balanced.

8 0
3 years ago
If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
Juliette [100K]

Answer:

Yes, if you want to be undetected.

Explanation:

It is vital to always use a command that will ensure that one's activity is undetected. This is one of the important rules of corporate organizations to keep their data and activities safe and secure. The commend provided is a useful tool for detective works especially the activities of criminals and hackers. Therefore, if the admin wants to be undetected, the command should not be used.

8 0
3 years ago
Read 2 more answers
I need help making this table in html code I have some of chart done but idk where to go after the 6:30pm part
Bumek [7]

dvioubfeevuf is hsvqvuvsqv

5 0
3 years ago
Other questions:
  • Storing a value in a variable<br> Exponent<br> Variable<br> Assignment<br> Operator
    13·1 answer
  • Which of the following Google tools support collaboration? Docs Sheets Slides All of the Above
    13·1 answer
  • What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
    9·1 answer
  • A network administrator is configuring the triggering mechanism for the network-based IPS by defining a pattern of web surfing a
    10·2 answers
  • Write a program that outputs inflation rates for two successive years and whether the inflation is increasing or decreasing. Ask
    9·1 answer
  • Liquid-liquid extraction is best suited to separate a mixture of compounds when:
    9·1 answer
  • What is a simulation?
    5·2 answers
  • List three features of the third generation of computers
    13·1 answer
  • My messaging system is messed up. It keeps saying I'm getting messages but then it says nothing new in my inbox. I'm confused- H
    15·2 answers
  • WHICH PROGRAMMING LANGUAGES ARE THE BEST AND COMPATIBLE FOR 3D PRINTERS?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!