1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aalyn [17]
3 years ago
7

How many fragments are generated?

Computers and Technology
1 answer:
Sedaia [141]3 years ago
3 0

Answer:

The answer is B.4 hope this helps

You might be interested in
What is the code i need to do
Greeley [361]
What section is it? I did the same thing a bit ago on edhesive
3 0
3 years ago
Suppose the inventory is unordered (!) and a sequential search is done to locate a specific artifact. Given that the search is e
lana [24]

Answer:

The computer can do 12000 searches per second. Suppose there are 60000 inventory items. And we need to search one item from it in a sequential manner. The computer can do 12000 searches in one second. Hence it can search in a list of 60000 inventory in 5 seconds, as 12000 x 5 =60000 searches, in the worst case. And if the item is below 12000 on the list, it will take less than 1 second(1/12000 sec in best case), and so on.

And if we assume that the list is sorted, and perform a binary search. then in the worst case, the number of searches required in the worst case will be 60000/2= 30000. And the time required will be 30000/12000= 5/2=2.5 seconds, and (1/24000) seconds in the best case. Its 1/24000 as its binary search.

Explanation:

Please check the answer section.

6 0
3 years ago
_____________ is the characteristic of a resource that ensures that access is restricted to only permitted users, applications,
Maksim231197 [3]

Answer:

The answer to this question is "Confidentiality".

Explanation:

The answer is Confidentiality because in any computer system many files are important for there user. If the file was deleted, corrupted or stolen from the computer. So the user faces the difficulty to avoid this type of problem computer system provides a technique that is access control or it is also known as Confidentiality. It is a technique that controls who or what type of user's use of resources in a computing environment.

So the answer to this question is Confidentiality.

4 0
3 years ago
True or false The content and form of digital text is static
Leona [35]
I wore haute you using Brainly.

False. Nothing is lacking in movement.

That was was pretty difficult, had to do some research for that one. So it may not be to correct one.
6 0
3 years ago
Read 2 more answers
How does confidentiality protect people and their online activity?
zlopas [31]
The answer is C Explanation: process of elimination
5 0
3 years ago
Other questions:
  • A company is inviting design for its new corporate logo from its users. This is an example of ? A. Crowdfunding B. Crowdvoting C
    7·2 answers
  • Budget at completion<br><br> What does this measurement tell you?
    8·1 answer
  • Which of the following is a correct statement about writing down passwords on a ""cheat sheet?""
    7·1 answer
  • TRY IT Choose the Right Technology MP3 player Widescreen laptop computer Smartphone Tablet computer with wireless Internet Suppo
    8·2 answers
  • Join my among us code<br> SHUHZF
    6·2 answers
  • Determining which computer platform (operating system) would be best for a particular student often depends on what the student
    11·1 answer
  • A large retail company hires several new joiners and would like to incorporate Virtual Reality (VR) into their onboarding proces
    11·1 answer
  • Give two differences between ergonomic keyboard and standard keyboard?​
    9·1 answer
  • Give reasons why you care for your sense organs​
    10·2 answers
  • Which statement best describes network security?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!