1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Digiron [165]
4 years ago
7

Dan needs to ensure that delegates as well as those looking at his shared calendar information are unable to see the details of

a particular calendar event. Which option should he use to achieve this?
Computers and Technology
1 answer:
Klio2033 [76]4 years ago
3 0

Answer:

If Dan uses Google Calendar application, he may edit the public visibility to "private" mode. Then, only the host of the meeting can see details. Usually can he hide the guest list but the meeting agenda is unlikely.

Explanation:

You might be interested in
The Department Manager researches new data platforms for the company and requests a list of essential features. Which essential
Ipatiy [6.2K]

Answer:

Centralisation

dashboard , programmatic access

Explanation:

hope it helps u

mark me as brainlist

4 0
3 years ago
What underlying concept is edge computing based on?
guajiro [1.7K]

Answer:

Edge computing was developed due to the exponential growth of IoT devices, which connect to the internet for either receiving information from the cloud or delivering data back to the cloud. And many IoT devices generate enormous amounts of data during the course of their operations.

Explanation:

8 0
2 years ago
Read 2 more answers
Suppose that a computer can run an algorithm on a problem of size 1,024 in time t. We do not know the complexity of the algorith
Setler79 [48]

Answer:

Time Complexity of Problem - O(n)

Explanation:

When n= 1024 time taken is t. on a particular computer.

When computer is 8 times faster in same time t , n can be equal to 8192. It means on increasing processing speed input grows linearly.

When computer is 8 times slow then with same time t , n will be 128 which is (1/8)th time 1024.

It means with increase in processing speed by x factor time taken will decrease by (1/x) factor. Or input size can be increased by x times. This signifies that time taken by program grows linearly with input size n. Therefore time complexity of problem will be O(n).

If we double the speed of original machine then we can solve problems of size 2n in time t.

5 0
3 years ago
What is the best response to cyberbullying?
astra-53 [7]
Answer is C





Braine list please:)
5 0
3 years ago
Read 2 more answers
Select the items that can be measured.
Slav-nsk [51]

Answer:

distance

capacity

smoothness

thickness

4 0
3 years ago
Read 2 more answers
Other questions:
  • A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itse
    15·1 answer
  • Which of the following is the best definition of a workplace policy?
    13·2 answers
  • To write 10 lines of code on paper:
    10·1 answer
  • All living organisms make up the (4 points)
    8·1 answer
  • When you park on a hill, think about which way _____.
    6·2 answers
  • A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review
    12·1 answer
  • All tif files start at offset 0 with what 6 hexadecimal characters?​
    11·1 answer
  • Why does dew form on grass overnight
    7·1 answer
  • What is application software? A computer language for accessing data in a database. A character string used to identify the loca
    10·1 answer
  • What happens when you apply a theme to a form?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!