1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Y_Kistochka [10]
3 years ago
14

What ideas should I write about for information writing

Computers and Technology
2 answers:
Lady bird [3.3K]3 years ago
5 0
Well first of all who is your favorite celebrity?
Then find some research and look up interesting facts you did not know about.
dolphi86 [110]3 years ago
3 0
Anything ,that is real. You have thousands of choices....sorry got to go. My cat is playing with a Lego piece.
You might be interested in
RAM memory is considered volatile because this memory is erased when the computer is turned off
Goshia [24]
False because ram is constantly always running
5 0
2 years ago
Suppose you wish to develop a matrix-multiplication algorithm that is asymptotically faster than Strassen’s algorithm. Your algo
Kazeer [188]

Answer:

The number of subproblems are given as T(n)=a*T(n/8)+\theta(n^2) while the value of T(n) to be less than S(n) is for 342.

Explanation:

The number of subproblems are given as

T(n)=a*T(n/8)+\theta(n^2)

Asymptotic running time for Strassen’s algorithm is S(n)=\theta(n^{log(7)})

Now, when a increases, number of subproblems determines the asymptotic running time of the problem and case 1 of master theorem applies. So, in worst case, asymptotic running time of the algorithm will be

T(n)=\theta(n^{logb(a)})=\theta(n^{log8(a)})=\theta(n^{log_{2}(a^{1/3})})

Now, for T(n) to be smaller than S(n)

n^{loga^{1/3}}

So,

log(a^{(1/3)})

So,

a=342

5 0
3 years ago
You'd like to change the minimum password length policy in the default domain policy group policy preference (gpo). What's the b
Naya [18.7K]

The best way to change the minimum password length policy is to open the Group Policy Management Console by running gpmc.msc from CLI.

<h3>What is a password policy?</h3>

A password policy refers to a set of rules and standard that are designed and developed by the data security of an organization, so as to enhance computer security and ensure all password meet the minimum requirements such as:

  • Password length
  • Password maximum age.
  • Password combination

In this scenario, the best way to change the minimum password length policy is to open the Group Policy Management Console by running gpmc.msc from CLI.

Read more on password here: brainly.com/question/3404286

#SPJ12

8 0
1 year ago
You arrive at your first client meeting with Jaba's Smoothie Hut. Jaba's owner, Kim, has asked you to install a Wi-Fi network fo
Dominik [7]

The correct package which can be used to set up the Jaba's Smoothie Hut so that there would be dedicated internet service with <em>enough bandwidth</em> to meet customer demand and run the store is:

  • <u>b. 100 Mbps service with 1 Modem/Router, a 24 port switch, 3 wireless access points (1 for office, 1 for retail, and 1 for outside)</u>

<u />

According to the given question, we are asked to show the correct package which can be used to set up the Jaba's Smoothie Hut so that there would be dedicated internet service with <em>enough bandwidth</em> to meet customer demand and run the store

As a result of this, we can see that when using wireless networks (WiFi), there is a necessity to <em>make use of</em> a fast 100 Mbps service so that the connection would have sufficient bandwidth to <em>meet the needs</em> of the store and customers.

Therefore, the correct answer is Option B

Read more here:

brainly.com/question/18450917

5 0
2 years ago
The information needed to make a programmed decision is ________ available, and the problem is ___________ structured. Group of
san4es73 [151]

Answer:

Readily, highly

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • You are writing a program that defines a variable within a loop, and then tries to use that variable outside the loop. However,
    9·1 answer
  • Fill in the blanks:(a)Every Java program must have at least one ______________.(b)The Java program is executed from _________ me
    12·1 answer
  • You must establish credit in order to buy a house true or false
    9·1 answer
  • Why was the term personal computer created?
    5·1 answer
  • When an individual user works in _____, the workstation performs all the functions of a server by storing, accessing, and proces
    15·1 answer
  • If an investigator finds a computer that is turned off during a search with a warrant, the investigator should:___________.
    5·1 answer
  • What is a characteristic ofa good cloud-based hosting?
    5·1 answer
  • PLEASE HELP I FAILED TWICE AND HAVE ONLY ONE MORE TRY BEFORE MY GRADE ARE SET I AM CRYINGGGGG PLEASEEE IM BEGGINGGGGG
    10·1 answer
  • Which of the following is not part of the processes involved in data valida
    11·1 answer
  • PLEASE help me i dont get this at all
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!