1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrMuchimi
3 years ago
13

A computer user who purchases a software package that will not operate on his or her hardware configuration is a victim of which

common computer problem?
Computers and Technology
1 answer:
Natalija [7]3 years ago
5 0
Is this a math problem? I don't get what you are trying to say sorry
You might be interested in
Estimate how many searches will be needed to justify time spent on presorting an array of 101 elements if sorting is done by mer
sertanlavr [38]

Answer:

Merge sort is sort, which contains the same elements in the array to maintain original positions concerning each other. Complexity of sort is O (nLogn) and runtime is O(nlogn)

Explanation:

Estimate time spent on presorting an array 101 element in merge and binary search, two schemes can be used in the first scheme if 101 items in sequential search then use the complexity of O(n). In the second scheme covert, the list into an array then sort an array with the complexity of O(n log n) and fetch the 101 elements.

Merge 101 elements; presorted sub-array n items have to compare the top times in sub-array and choose the maximum item and place it in a sorted array. Time for merging is proportional to ( k-1) n.

Suppose the processing time of the merger is c.(k-1) .n then scale factor has the same value.

The processing time of a sorting array is a recurrence equation.

T(n) = 3T (n/3) + 2 cn

Similarly this implement for array of 105 element.

5 0
4 years ago
Discuss the various types of keys available on a computer keyboard.<br>No spam answer needs!❌❌​
olga nikolaevna [1]

Answer:• Alphanumeric keys – all of the letters and numbers on the keyboard. A-Z and 0-9.

• Punctuation keys – All of the keys associated with punctuation such as the comma,

period, semicolon, brackets, parenthesis and so on. Also, all of the mathematical

operators such as the plus sign, minus sign, and equal sign.

• Special keys – All of the other keys on the computer keyboard such as the function

keys, control keys, arrow keys, caps lock key, delete key, etc.

Special keys on a PC Keyboard

• Alt key – Short for Alternate, this key is like a second control key.

• Arrow Keys – Most keyboards have four arrow keys that enable you to move the

cursor (or insertion point) up, down, right, or left. Used in conjunction with the Shift

or Alt keys, the arrow keys can move the cursor more than one position at a time, but

this depends on which program is running.

• Backspace key – Deletes the character just to the left of the cursor (or insertion

point) and moves the cursor to that position.

• Caps Lock Key – A toggle key that, when activated, causes all alphabetic characters

to be uppercase.

• Ctrl key – Short for Control, this key is used in conjunction with other keys to

produce control characters. The meaning of each control character depends on which

program is running.

• Delete Key – Sometimes labeled Del, deletes the character at the current cursor

position, or the selected object, but does not move the cursor. For graphics-based

applications, the Delete key deleted the character to the right of the insertion point.

• Enter Key – Used to enter commands or to move the cursor to the beginning of the

next line. Sometimes labeled Return instead of Enter.

• Esc Key – Short for Escape, this key is used to send special codes to devices and to

exit (or escape) from programs and tasks.

• Function Keys – Special keys labeled F1 to F12. These keys have different meaning

depending on which program is running.

Explanation: use quillbot or wordtune to change the words

3 0
2 years ago
Which open-sourced packet capture tool uses linux and mac os x operating systems?
Leto [7]

Tcpdump is an open-sourced packet capture tool which uses Linux and Mac OS X operating systems.

<h3>What is tcpdump?</h3>

Tcpdump can be defined as an open-sourced packet capture tool that is typically used to monitor and record TCP/IP traffic that are passing through a network and most Unix-like operating systems such as Linux.

This ultimately implies that, tcpdump is an open-sourced packet capture tool which makes use of Linux and Mac OS X operating systems.

Read more on tcpdump here: brainly.com/question/14485515

#SPJ12

5 0
2 years ago
On the pie chart below, which “slice” represents 30% of the budget?
yan [13]

A is the final answer! :)

4 0
3 years ago
List at least four items that security policy should include
forsale [732]

Answer:

Purpose.

Audience.

Information security objectives.

Authority and access control policy.

Data classification.

Data support and operations.

Security awareness and behavior.

Encryption policy.

4 0
2 years ago
Other questions:
  • PLEASE HELP!!!!!!!!!!!
    7·1 answer
  • Instructions:Select the correct answer.
    15·2 answers
  • The rules that determine what is allowed in a program are known as the
    14·1 answer
  • The desktops of computers running the same OS all look the same
    8·1 answer
  • Do debit cards allow you to draw funds directly from your checking accounts
    10·1 answer
  • Animation timing is does not affect the
    10·1 answer
  • You attempt to telnet to system 192.168.1.240. You receive the following message: "Connecting To 192.168.1.240...Could not open
    5·1 answer
  • Portable Document Format is a proprietary document file type created by Adobe Systems that is compatible with most computer syst
    7·1 answer
  • You are designing an ecommerce web application that will scale to hundreds of thousands of concurrent users. Which database tech
    10·1 answer
  • Who would benefit from using self-driving cars
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!