1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vampirchik [111]
2 years ago
10

You are given a list of N integers . find the largest sum of a continuous sequence from the given list

Computers and Technology
1 answer:
Vera_Pavlovna [14]2 years ago
4 0

Explanation:

di5ditdi5suufsutydskydjgsukstralurilttdljstp7hzpgxuptdoyd

You might be interested in
Assume that you are testing the Orders database introduced in Watt (2014) - Appendix C. Discuss the problems and possible conseq
madreJ [45]

Answer:

129 \frac{2}{?} 23.4. \div 164 \times 5y1 + . \\ .00487ggh

6 0
3 years ago
which of the following electromagnetic waves are not used for communication? a.gamma rays b.microwaves c.infrared waves d.radio
Flura [38]

Gamma rays are not used for communication.

-- We have no safe way to generate them.
-- We have no cheap way to detect them.
-- We have no way to impress information on them (modulate them).
-- They're dangerous.

Otherwise they're ideal for communication.


3 0
3 years ago
Which screen should be open to customize or personalize a desktop background
maw [93]
Minimize any apps/webpages on it you have open (your background has to be visible), left click with the mouse, hit Personalize, and it should have Backgrounds on the page if you scroll down. You can hit Browse to look through your files on the desktop for what you want. 
8 0
3 years ago
Jack, a skillful hacker targeted a major banking services firm located in Japan, using the LOIC (Low Orbit Ion Cannon) tool, Jac
Elenna [48]

Answer:

denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack)

Explanation:

Denial-of-service attack -

It is a type of cyber attack , where the hacker can create a machine or any network resource , which is capable to disrupt the server of the host , with the help of the internet , is referred to as the denial of service attack .

The task is accomplished with by flooding the host with many superfluous requests , which can overload the system .

In case of the distributed denial-of-service attack , the flooding is done by many different sources .

Hence , from the given scenario of the question ,

The correct answer is  denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack) .

4 0
4 years ago
1. Select the Volatile Memory *
fomenos

Answer:

1 no.

ram

2

harmful software to the computer

3

local area network

4

bit

5

ram

6

morris malware

7

hard disk drive

8

read only memory9

gigabyte

hope this will help u

6 0
3 years ago
Other questions:
  • Consider a relation representing the present position of molecules in a closed container. The attributes are the ID for the mole
    12·1 answer
  • The protocol that enables computers on the Internet to communicate with each other is called _____.
    7·1 answer
  • Isaac is researching Abraham Lincoln’s life for a social studies report. He finds an encyclopedia that includes original letters
    5·2 answers
  • A Game Object must have a Transform<br><br> True<br><br> False
    5·1 answer
  • .When an argument is passed ______________, the called method can access and modify the caller’s original data directly.
    8·1 answer
  • Samantha was calculating a mathematical formula on an electronic spreadsheet. She used multiple values to recalculate the formul
    8·2 answers
  • What is the importance of Mathematical Modeling in the field of bioinformatics.
    8·1 answer
  • Is the internet a private place?
    15·2 answers
  • How to find out what windows version i have?
    10·1 answer
  • Salvado has a flash dish of is GB
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!