1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
3 years ago
12

What is information associated with a document to help describe that document called?

Computers and Technology
1 answer:
noname [10]3 years ago
3 0
You'd call that 'metadata'.
You might be interested in
The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platf
olasank [31]

Answer:

Unix

Explanation:

UNIX is simply an operating system developed by Bell Laboratories in the 1960s. Ever since then, it has been constantly worked upon and developed. It is an operating system because it is a suite of programs capable of making a computer to function. Unix is considered to be a stable, multi-user, and multi-tasking system for both desktops and laptops and even servers.

8 0
3 years ago
I can’t get answers because the ads won’t load help me
Flura [38]

Answer: Get better wifi

Explanation: This maybe a router problem, Go to your router and reset it by unplugging the power chord, After 30 seconds plug it back in and wait for your wifi to start back up. Your ads should load now. Have a good day.

7 0
3 years ago
According+to+gartner+research,+by+2020,+_____+will+be+the+greatest+source+of+competitive+advantage+for+30%+of+organizations.
pentagon [3]

According to Gartner Research, by 2020, digital dexterity will be the greatest source of competitive advantage for 30% of organizations.

Organizations are under increasing pressure to keep up with the ever-changing digital landscape. To stay ahead of the competition, many are turning to digital dexterity as a source of competitive advantage.

Gartner Research predicts that by 2020, digital dexterity will be the greatest source of competitive advantage for 30% of organizations. To achieve digital dexterity, organizations need to be able to rapidly adapt to changing market conditions and technologies.

To stay ahead of the competition, organizations need to invest in training and development programs that will help employees stay up-to-date with the latest digital trends. Additionally, organizations need to create a culture of innovation that encourages employees to experiment with new technologies and ideas.

By 2020, digital dexterity will be a critical source of competitive advantage. Organizations that are able to effectively harness the power of digital technology will be well-positioned to succeed in the future.

Learn more here:

brainly.com/question/17178886

#SPJ4

7 0
2 years ago
Part B - Find the solutions for the following Case Study Real World Problems by applying the appropriate concepts that you learn
Monica [59]

Answer:

ok very surprised to hear that

5 0
3 years ago
Suppose we compute a depth-first search tree rooted at u and obtain a tree t that includes all nodes of g.
Temka [501]

G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

<h3>What are DFS and BFS?</h3>

An algorithm for navigating or examining tree or graph data structures is called depth-first search. The algorithm moves as far as it can along each branch before turning around, starting at the root node.

The breadth-first search strategy can be used to look for a node in a tree data structure that has a specific property. Before moving on to the nodes at the next depth level, it begins at the root of the tree and investigates every node there.

First, we reveal that G exists a tree when both BFS-tree and DFS-tree are exact.

If G and T are not exact, then there should exist a border e(u, v) in G, that does not belong to T.

In such a case:

- in the DFS tree, one of u or v, should be a prototype of the other.

- in the BFS tree, u and v can differ by only one level.

Since, both DFS-tree and BFS-tree are the very tree T,

it follows that one of u and v should be a prototype of the other and they can discuss by only one party.

This means that the border joining them must be in T.

So, there can not be any limits in G which are not in T.

In the two-part of evidence:

Since G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

The complete question is:

We have a connected graph G = (V, E), and a specific vertex u ∈ V.

Suppose we compute a depth-first search tree rooted at u, and obtain a tree T that includes all nodes of G.

Suppose we then compute a breadth-first search tree rooted at u, and obtain the same tree T.

Prove that G = T. (In other words, if T is both a depth-first search tree and a breadth-first search tree rooted at u, then G cannot contain any edges that do not belong to T.)

To learn more about  DFS and BFS, refer to:

brainly.com/question/13014003

#SPJ4

5 0
2 years ago
Other questions:
  • If you are trying to create a web page for your band and having difficulty creating links to other groups on your page, what is
    7·1 answer
  • While configuring a switch, you noticed a configuration issue with an Ether Channel bundle. You thought you corrected the issue,
    11·1 answer
  • In Labrador retrievers, black coats are dominant and brown coats are recessive. What is the genotype of a brown Labrador?
    5·1 answer
  • Consider an array of size nine with the numbers in the following order: 40, 60, 20, 80, 70, 90, 30, 10, 50. (a) Create the heap
    7·1 answer
  • In a CSS document, within what must you enclose properties and values when you define a rule for a specified selector?
    13·1 answer
  • At the beginning of Section 5.2, it is stated that multiprogramming and multiprocessing present the same problems, with respect
    8·1 answer
  • Six external parts of a computer system
    13·1 answer
  • 10. Question<br> What are the drawbacks of purchasing something online? Check all that apply.
    5·1 answer
  • The formula (Block address) modulo (Number of blocks in the cache) shows the typical method to index a direct-mapped cache. Assu
    12·1 answer
  • Trong mạng internet, chúng tôi thay đổi công nghệ mạng LAN sang một công nghệ
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!