1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kkurt [141]
2 years ago
9

PLEASE HELP Write a pseudo code for an algorithm to wrap a gift.

Computers and Technology
1 answer:
Thepotemich [5.8K]2 years ago
4 0

in computertional geometry the gift wrapping algorithm is an algorithm for computing the context hull of a given set of points

You might be interested in
Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address
Luden [163]

Answer:

The packet is dropped

Explanation:

To see why we need to understand the ACL or Access-control list that is a list of permissions that specify which users can access or modify certain things in a system. Because the source IP  doesn't have any parameter and is just a plain IP and packet the Cisco firewall will drop the packet based on the ACL rules, in other words, the Cisco firewall doesn't have any parameter that allows it to verify the permission-level of the sender, therefore, the packet will drop.  

7 0
3 years ago
What the five types of initiatives that are necessary when putting together and implementing an IT strategy
STatiana [176]

Answer:

Pre-implementation

Planning

Execution

Completion

Control

Explanation:

The pre-implementation stage speaks volumes on the breakdown of the implementation stages and how it is being formulated. It shows a stepwise identification of important implementation carriers and the responsibility of the IT organization. Their focus is to determine the content and human resources that are required to implement the strategy being formulated.

The purpose of the planning implementation stage is to plan and agree on specific goals by considering all stakeholders. There is also a need to set deadlines, time-to-time evaluation, and effective coordination of the stakeholders.

The execution phase enforces the implementation plan. As the name implies, it builds a comprehensive plan by focusing on the target group to maintain and ensure a structural and systematically conducted work environment.

The completion phase includes all actions necessary to bring out the results within the organizzation. Initially, there is a need to agree on the dimension of the IT strategy, the time dimension, and the detailed dimension.

The last phase which is the control deals with the logic of setting appropriate quantitative and qualitative control measures so as to allows continuous implementation control and navigation implementation control.

7 0
3 years ago
In order to generate a random number, you must use Math.random( ). Group of answer choices True False
Tanzania [10]

Answer:

False

Explanation:

While Math.random() can be used to generate a random number, Java programming language also has a class called Random in the java.util package which can be imported into your code. This is a more efficient way of generating random numbers (ints or doubles) as you can instantiate several random number generators. The following line of code creates an an object of the class Random and sets the bound to 10.

Random rand = new Random (10);

This will generate random number from 0-9.

5 0
4 years ago
You are a domain administrator for a large, multi-domain network. There are approximately 2500 computers in your domain. Organiz
Anit [1.1K]

Answer:

move the computer accounts from their current location to the correct Organizational Units (OU's)

Explanation:

Based on the information provided within the question it can be said that in this scenario the best thing to do would be to move the computer accounts from their current location to the correct Organizational Units (OU's). This would keep things organized and have each computer account in the unit that they belong with the correct access and privileges that they need.

5 0
4 years ago
Which area of a magazine cover is often important for those shops and stalls that cannot display the entire cover page on a stan
zloy xaker [14]

I think the answer is one fourth.

Because usually only that part is visible in a stand. It usually contains the name of the magazine and a little bit of illustration gives an idea about what it is about.

6 0
3 years ago
Other questions:
  • Write a program that defines an interface having the following methods: addition, subtraction, multiplication, and division. Cre
    8·1 answer
  • The most commonly used video formats are the mpeg-____ format, the windows media audio/video format, and the audio visual interl
    12·1 answer
  • _____ software can help a company manage security, enforce corporate strategies, and control downloads and content streaming fro
    11·1 answer
  • What does an operating system do?
    11·2 answers
  • What role does the agenda play in a webinar??
    14·1 answer
  • A comma is also called a statement terminator. A. True B. False
    8·1 answer
  • Successful implementation of an effective MRP system depends upon (1) the recognition of the difference between independent and
    13·1 answer
  • You can perform an in-place upgrade to Windows 7 from both Windows XP and Windows Vista
    10·1 answer
  • Which of the following situations is least likely fair use
    6·2 answers
  • Write a MIPS assembly language program that adds the following two integers and displays the sum and the difference. In the .dat
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!