1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
3 years ago
6

Why is the answer A?

Computers and Technology
1 answer:
vitfil [10]3 years ago
7 0
HashSet changes the array to be in alphabetical order. It also removes any items that are in the array twice.
You might be interested in
Examples of intermediate technology​
Effectus [21]

Example of intermediate technology is the treadle pump, which enables farmers to provide a greater amount of water to their plants more easily compared to watering by bucket, while requiring much less infrastructure than constructing irrigation dams and pipes.

3 0
3 years ago
Read 2 more answers
Explain which implementation of the protection matrix is more suitable for the following operations___________.
Mars2501 [29]

Answer:

See explanation.

Explanation:

(a)

• To grant read access to a file for all users, access control list (ACL) is the best option.

o Create a group called 'all' with all users in it (assume the group name as 'all').

o Make a ACL for the file name with ACL as 'all:R'.

• It can also be done with capability list. With capability lists. it is sufficient to place the capability for the file in appropriate place in a capability system.

(b)

• To revoke write access for a file from all users, access control list (ACL) is the best option.

o Edit the ACL by removing the write access.

o If the group 'all: W' was the entry added to ACL, remove it from the ACL.

• It can also be done with capability list by changing the check field stored with the object.

(c)

• To grant write access to a file to John, Lisa. Christie and Jeff either the access control list method or the capability list can be used.

• It can be implemented with ACL as follows:

o Construct ACL for the file for all users,

o Then the ACL for file would be 'Christie, Jeff. John, Lisa: W'.

• It can be implemented using capability list method as follows:

o First construct the capability list for the file, 'file:W'.

o Then assign the above capability for each user named John, Lisa, Christie and Jeff.  

(d)

• To revoke execute access for a file from Jana, Mike, Molly, and Shane, access control lists are the only possibility.

o Edit the ACL by removing the execute access.

Hope this hels!

5 0
3 years ago
Text to appear
jasenka [17]

Answer:

bg color stands for background color while SKYBLUE is the color assigned to it.

Explanation:

It is setting the background color of the body tag to sky blue.

4 0
2 years ago
What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?
miss Akunina [59]
The device that acts like a wireless base station in a network would be an access point. It acts as a bridge between the wireless and wired networks. It receives and transmits signal between networks. It connects every user in that network.
3 0
3 years ago
What number system is the basis for all of the powerful computers and electronic devices in the world?
labwork [276]

Answer:

Binary

Explanation:

3 0
3 years ago
Other questions:
  • To create a chart you need to select at least ___ in a range of data
    15·1 answer
  • Which programming language looks similar to human languages?
    12·1 answer
  • With modeling and simulation, we model the system and then test the ______________ to gather test predictions.
    7·1 answer
  • Which option should you select to ignore all tracked changes in a document? To ignore all tracked changes in a document, you sho
    15·2 answers
  • , , ,g d,t ,dt m,dt ymtd
    9·1 answer
  • Select the correct answer. Which sign or symbol will you use to lock cells for absolute cell reference?
    9·2 answers
  • What is the diffrent between ibm pc and ibm compatibles in table:​
    11·1 answer
  • porfavor no es una pregunta dificil, nisiquiera es de una tarea, hace poco mi computador windows 10 no recibia el sonido de mis
    9·1 answer
  • explain why the database system would not allow a tuple to be inserted into the database through this view
    12·1 answer
  • Which of the following tells the computer hardware what to do? A Information B) Software Procedures D People
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!