1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
const2013 [10]
3 years ago
7

Because the data was formatted the same in two inventory files, you decided to combine their contents into one file. Now you wan

t to determine if there are duplicate entries on consecutive lines in the new file. Which of the following commands enables you to find the duplicate entries?a. dupb. prc. uniqd. cat
Computers and Technology
1 answer:
snow_tiger [21]3 years ago
3 0

Answer:

c. uniq

Explanation:

You might be interested in
Your friend is applying for a job at your company. She asks you to recommend her. She wants you to tell your boss that you have
Gekata [30.6K]
I think you should tell her you cannot lie about working with her
7 0
3 years ago
Determine the efficiency and big-O notation for the following algorithm:
Anon25 [30]

Answer and Explanation:

To calculate Big O, go through each line of code and determine O(!), O(n) and return your calculation.

For example,

In O (5 +6n), where 6 5 represent five instances of O(1), and 6 represent the 6 O(n).

We compute the time complexity of the algorithm. We get the result, just an estimation. In given algorithms, run time in milliseconds has been provided, such as in T (1) algorithm process in 512 milliseconds and T(2) algorithms process 8129 milliseconds. But big O notation not measured in milliseconds. Information given is not enough to calculate the big O notation.

       

8 0
4 years ago
Suppose 8 people want to communicate with each other using public key encryption. The communication between any pair of them is
ludmilkaskok [199]

Answer:

The answer is "64"

Explanation:

There has been 1 Private Key 1 Public Key for every person. The private key is used for other app messages. All else uses the Public Key to encrypt messages with that user. Those keys are numerically related. Even if you have 5 users, you will be given 5 Personal keys and 5 Public keys.

  • All user will have a duplicate of other public keys, which indicates (n*n-1) copies of n public keys on different systems to make sure shared contact between all users, plus n private keys.
  • The unique key count is 2n, with n^2 distributed private and public keys on different systems.
  • 8 people,  where 8 is a number, that is equal to n so, n^2 = 8^2 =8 \times 8 = 64
5 0
3 years ago
when you enter a formula in a cell the result of the calculation displays in a cell. how do views of formula after entering it?
Vika [28.1K]

<u>Answer:</u>

Any formula entered in the excel sheet should begin with “=”. Otherwise excel reads that to be a normal text and it will not process the further to get a “result”.

A formula can be entered either in <em>the cell or in the “formula bar”</em>. Once a formula is entered and an enter key is encountered, the result will be displayed in the <em>cell and connected formula</em> gets displayed in the Formula bar.

When we move the focus over that cell it <em>displays only content and not formula,</em> because formula gets displayed only in the “formula bar”.

7 0
4 years ago
For each vertex v of the DAG, in the topological ordering, compute the length of the longest path ending at v by looking at its
FromTheMoon [43]

Answer:

Following are the step by step algorithms is explain below.

Explanation:

Following are the algorithm for searching shortest distances.

  • Firstly, Initialize the array variable distance[] = {INF, INF, ….} as well as distance[s] = 0 in which the variable 's' is the beginning vertex
  • Then, you have to develop a topological order of the following vertices.
  • So, Do in the following for mostly vertex that is the variable 'u' in the topological order.

          Do on the following for mostly contiguous vertex that is 'v' of 'u'

                         if (dist[v] > dist[u] + weight(u, v))

                               dist[v] = dist[u] + weight(u, v)

8 0
3 years ago
Other questions:
  • Which of the following emerging technologies uses the principle of chromosomes to identify suspects?
    10·1 answer
  • If user reading a document on computer, it allows you to navigate on any part of the document called?
    5·1 answer
  • Most software packages have functions for generating _____ about columns of data, which include statistical summaries like contr
    7·1 answer
  • What is a word processor in ms word​
    9·2 answers
  • Write a function to prompt the user to enter the information for one movie (title, release date, mpaa rating and number of stars
    8·1 answer
  • Every Java statement ends with: *<br><br> Period<br> Colon<br> Double quote<br> Semicolon
    11·2 answers
  • Lindsey also needs to calcite the commissions earned each month. If the company earns $200,000 or more in a month, the commissio
    5·1 answer
  • Write a program to have the computer guess at a number between 1 and 20. This program has you, the user choose a number between
    9·1 answer
  • Can someone help me with this question, i know all except psuedocode, help me please
    6·1 answer
  • MmfbfMMMMMMMMMMMMMMMMMmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!