1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
15

_____ are skilled computer users who try to gain unauthorized access to other people’s computers.

Computers and Technology
1 answer:
Illusion [34]3 years ago
6 0
Hackers would be da  answer

You might be interested in
what happens when you double-click on a file with an extension that represents an executable program?
Vlada [557]

Answer:

it will execute the file

Explanation:

3 0
4 years ago
Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are con
Wewaii [24]

Answer:

The correct answer is option (A).

Explanation:

Pinterest has turned to amazon for storage as a service because it continuously needs a large amount of storage as given in the scenario.

While the other options are not correct because of the following reasons:

  • Grid computing can be defined as the concept of connection between a large number of computers in an architectural way who work to obtain the same goal but grid computing can not fulfill the need for storage for Pinterest.
  • Cloud computing can work as data storage which can be accessed from the internet anywhere but this can not fulfill the storage requirements for Pinterest as they are very huge.
  • Infrastructure as a service is not correct because the need of the company is for storage.

4 0
4 years ago
When you record a macro, you can assign it to run from a button or from the _____.
arsen [322]
Depends on what software you use and how you set it up. But yea it’s possible
3 0
4 years ago
Read 2 more answers
) Suppose algorithm A takes 10 seconds to handle a data set of 1000 records. Suppose the algorithm A is of complexity O(n2). Ans
Mice21 [21]

Answer:

i) The time taken for 1500 records = 15 seconds.

ii) The time taken for 1500 records = 50 seconds.

Explanation:

A is an O(n) algorithm.

An algorithm with O(n) efficiency is described as a linearly increasing algorithm, this mean that the rate at which the input increases is linear to the time needed to compute that algorithm with n inputs.

From the question, it is given that for 1000 records, the time required is: 10 seconds.

Algorithm time taken is O(n)

Hence,

1) For 1,500 records

=> 10/1000 = x/1500

=> 10x1500/1000 = x

x = 15 seconds

Thus, the time taken for 1500 records = 15 seconds.

2) For 5,000 records

=> 10/1000 = x/5000

=> 10x5000/1000 = x

x = 50 seconds

Thus, the time taken for 1500 records = 50 seconds.

8 0
3 years ago
Jim maintains attendance records for his employees for the year. Row B includes the dates of attendance, and column A includes t
ahrayia [7]
To lock multiple rows (starting with row 1), select the row below the last row you want frozen, choose the View tab, and then click Freeze Panes. To lock multiple columns, select the column to the right of the last column you want frozen, choose the View tab, and then click Freeze Panes<span>.


I hope my answer has come to your help. Thank you for posting your question here in Brainly. We hope to answer more of your questions and inquiries soon. Have a nice day ahead!
</span>
4 0
4 years ago
Read 2 more answers
Other questions:
  • What can be used to visually represent information similar to a diagram
    12·1 answer
  • A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company’s firewall
    12·1 answer
  • A chef writing up her famed recipe for beef stew realizes she has switched parsley and oregano everywhere in the recipe. The che
    13·1 answer
  • Does anyone know what type of Honda this is and the year of it lol this isn’t school related
    10·1 answer
  • Intellectual property piracy has gotten a small boost from the increasing availability of counterfeit goods through Internet cha
    14·1 answer
  • TCP is a Transport-layer protocol used to communicate between applications, but it's a lightweight Transport-layer protocol, mea
    10·1 answer
  • What is a moves track
    5·1 answer
  • Jesse wants to create a website with her company name as the address. What should she do next?
    9·1 answer
  • Which fund classification would a focus on only stocks of technology companies match?
    10·1 answer
  • Which of the following is NOT provided by the Device
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!