1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naily [24]
3 years ago
9

Jamie is writing an investigative report with footnotes

Computers and Technology
2 answers:
xxTIMURxx [149]3 years ago
7 0

Answer:

????

Explanation:

does she need help with the footnotes?

Verdich [7]3 years ago
7 0

Answer:

that is not a question i can answer

Explanation:

that's all

You might be interested in
Your boss has asked you to create a customized letterhead for the business, "Boyne Mountain Ski Shop". Explain how to create the
lakkis [162]

Creating a letter head is very simple. However, you need to do some planning. You are required to pick a size and shape accordingly. I would prefer a landscape oriented rectangle. Select a theme appropriate and consistent with the traits of you company. Personalize with a simple and sleek image that can be printed easily if necessary. Select a font that is bold enough, readable, and eye catching. You can include items like a slogan, a name, phone numbers, address, email address, a link to you web address and the established dates.

5 0
3 years ago
In this problem you are to compare reading a file using a single-threaded file server and a multithreaded server. It takes 12 ms
borishaifa [10]

The answer & explanation for this question is given in the attachment below.

3 0
3 years ago
You are the information security officer at a medium-sized company (1,500 employees). the cio asks you to explain why you believ
Ivahew [28]
If your CIO asks such a stupid question run for the hill, he should not hold that title.
Every company, small, medium or large should have Firewalls, Intrusion Detection, Managed Virus Protection Software at the very least. Windows is the most deployed OS in the world and of course the main target of hackers i.e Viruses. MAC's to a lesser extent and Unix while probably the least vulnerable are still not immune to Viruses/Trojan and other Malware.

Users can still be the victims of trojan horses, phishing scams, and other online fraud. There<span> is no such thing as a 100% safe computer, a </span>Mac<span>, Windows, and even Linux are all capable of being infected with a </span>virus<span> or other malware.
</span>
Lastly, physical access to any computer that is not encrypted is vulnerable.
5 0
3 years ago
The purpose of performance profiling (experimental analysis) is to measure the program/algorithm performance. Assume that you ha
Andru [333]

Answer:

C. O(n).

Explanation:

for better understanding, the os is a program that helps in telling how much resources can be used and when processor can be accessed.

to each programme data structures would load and unload every time that a programme is to be run.

while a programme is being managed there would be extra overheads and based on whatever type of os or programme that this is, it may or may not have fixed overhead

from our question overhead is fixed at 100ms

we have,

net time as: 300-100, 510-100, 905-100, 1750-100, 3305-100,

which is, 200, 410, 805, 1650, 3205

when we double 2¹⁰ to 2¹¹ to 2¹² etc, the programme ran is also doubling

this says that run time is same as size of instance n

O(n)

8 0
3 years ago
Which company was the first to develop personal computer?
Fudgin [204]

Answer:

Electronic Controls Company 

6 0
2 years ago
Other questions:
  • Alex leads a team of eight members. Arrange his tasks in sequential order of phases of group dynamics. What are the stages in gr
    13·1 answer
  • What safety precaution should you take while filling the fuel tank of a gasoline-powered boat?
    8·1 answer
  • The major types of wireless media are______________.
    6·1 answer
  • You are to write a program name matrix.java that multiplies two matrices. 1. Your program should prompt the user for the dimensi
    5·1 answer
  • I NEED an example of output plssss​
    13·1 answer
  • 11.11 LAB: Number pattern Write a recursive function called PrintNumPattern() to output the following number pattern. Given a po
    13·2 answers
  • Guys help me, to get 25 examples of computer software​
    8·1 answer
  • In which type of class methods is it typically necessary to filter bad arguments (either directly or indirectly with the help of
    13·1 answer
  • Which sentence in the passage shows an effective way to protect your document from misuse? Claire has saved her research paper o
    14·1 answer
  • a user reports that her computer monitor will not allow her to switch back and forth between Microsoft word and internet explore
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!