1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dexar [7]
3 years ago
12

A collection of related files that serves as a foundation for retrieving information is a: byte

Computers and Technology
1 answer:
dem82 [27]3 years ago
3 0
<span>c. database  is the answer.</span>
You might be interested in
A network administrator is reviewing a network design that uses a fixed configuration enterprise router that supports both LAN a
tester [92]

Answer:

a modular router

Explanation:

A modular router is a type of router that will provide multiple slots, this will enable the network engineer to either change or increase the number of space the router has.

A layer 3 switch cannot provide a WAN connectivity even though it can increase the number of ports on a router. The concept of PoE capability of any device have nothing to do with the number of ports it has. If the Engineer decides to use another fixed configuration router it will still lead to the same problem in the future because it cannot guarantee or provide the flexibility of future growth adaptation which can be given by a modular router if put in use.

8 0
3 years ago
Select the correct answer.
Softa [21]

Answer:

MY ANSWER IS B.

Explanation:

B.A+(B.C)

3 0
3 years ago
Create a project for a sandwich shop. The project, named SalsSandwiches, allows a user to use a ListBox to choose a type of sand
nirvana33 [79]

Answer:

Create a new C# windows application with the name SalsSandwiches. Add the below code in respective file.

Explanation:

See attached images for the source code and output

7 0
3 years ago
An online supermarket wants to update its item rates during the sales season. They want to show the earlier rates too but with a
cupoosta [38]
Cheaper elements gives a strike through appearence
7 0
3 years ago
Read 2 more answers
The ArrayList class contains a trim method that resizes the internal array to exactly the capacity. The trim method is intended
andreev551 [17]

Answer:

public void trimToSize() {

modCount++;

if (size < elementData.length) {

elementData = (size == 0)

? EMPTY_ELEMENTDATA

: Arrays.copyOf(elementData, size);

}

}

Now, the running time for copyOf() function is O(N) where N is the size/capacity of the ArrayList. Hence, the time complexity of trimToSize() function is O(N).

Hence, the running time of building an N-item ArrayList is O(N^2).

Please find the sample code below.

CODE

==================

import java.util.ArrayList;

public class Driver {

  public static void main(String[] args) throws Exception{

      int N = 100000;

      ArrayList<Integer> arr = new ArrayList<>(N);

     

      long startTime = System.currentTimeMillis();

      for(int i=0; i<N; i++) {

          arr.add(i);

          arr.trimToSize();

      }

      long endTime = System.currentTimeMillis();

      double time = (endTime - startTime)/1000;

      System.out.println("Total time taken = " + time + " seconds.");

  }

}

Explanation:

5 0
3 years ago
Other questions:
  • What are some facts about webmasters?
    10·1 answer
  • Many people in modern society have the notion that hard disks can be searched in an hour and files can be recovered from inciner
    10·1 answer
  • Why is compression a "hard problem" for computers? Draw on your own experience compressing text with the text compression widget
    12·1 answer
  • Data flow is not a major consideration when building an analytics model. T/F
    13·1 answer
  • As a computer science student, which career you will select and what do you predict about the future of that specific IT-Career.
    8·1 answer
  • List at least 5 features that can be used to format a report in word 2013
    6·1 answer
  • What is the practical application of the information acquired by science.
    15·1 answer
  • Which of the following is an advantage of using
    6·2 answers
  • In which situation is coauthoring of presentations primarily utilized?
    13·2 answers
  • which one of the following would not normally be found in an organization's information security policy?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!