1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
siniylev [52]
3 years ago
13

What does "ttyt" stand for?

Computers and Technology
2 answers:
EastWind [94]3 years ago
6 0
TTYT stands for "talk to you tomorrow".
kolbaska11 [484]3 years ago
6 0
OR...... Mrs. GreenRune, it could mean

2nd most used : Talk to you Tonight
3rd most used : Talk To You Then

Or Than The Yogurt Talked
You might be interested in
Impact of computer on education
MAVERICK [17]

Answer:

Computers can have both a positive and negative impact on education.  

Positives:

-students have access to more information (the internet)

-students can more efficiently type and research

-students can save time (ex not having to walk to a library)

Negatives:

-can be a distraction

-students may have a harder time staying on task/topic

-students may develop a technology addiction

6 0
3 years ago
Read 2 more answers
Design a data structure to support the following two operations for a set S of inte- gers, which allows duplicate values: • INSE
umka2103 [35]

Answer and Explanation:

Note that we are free to use any data structure that allows for arbitrary insertion and deletion of data

As an underlying data structure, we’ll use an (unsorted) array. INSERT(S, x) will  simply append x to the array, increasing its length. This has a constant runtime,  so we’ll say its cost is 1.

DELETE-LARGER-HALF(S) will work as follows: first, use SELECT to find the  median. Next, use PARTITION around the median to make sure that the upper half is stored within the last [|S|/2] elements. Finally, we delete these elements,  reducing the size of the array.This has a linear running time, so we’ll say its cost is n.

To show that any m operations can run in O(m) time, we define a potential  function \phi(S) = 2|S|. The amortized cost of INSERT is thus 1 + \delta \phi = 1 + 1 = 1 ;  the amortized cost of DELETE-LARGER-HALF is n +\delta\phi\leq n-2(n/2) = 0. So the  amortized cost of any m operations is O(m).

This answer essentially captures the idea behind the problem. However, there  are some technical points to clear up. (Calling the real-time costs 1 and n are not among them; this underestimates the running time by at most a constant. Ignoring constants like that is necessary to make concise arguments about amortized costs.)

First, an array does not support arbitrary insertions. Possible remedies include:

(1) using a dynamic array along the lines of §17.4, or (2) using a different structure  like a linked list, and having DELETE-LARGER-HALF convert it to an array and  back in linear time so that the SELECT and PARTITION algorithms may be used.

Second, it’s important to know which median to partition around and how to  delete the upper half of the elements: a mistake could lead to incorrect behavior when the array has an odd size or repeated elements. We should select the lower median,[|S|/2], since that’s the number of elements we want in the lower set: as  written, the CLRS Partition function will put elements less than or equal to the

pivot in the left set, and strictly larger elements in the right set. (If the partition function is defined differently, the answer should be different as well. You generally  should give a brief description of how your partition function works.) After a call to Partition, it is safe simply to keep the first [|S|/2] elements and drop the rest. On the other hand, it is not safe to go around deleting every element with

a sufficiently large value—take an array of zeros as a drastic example. If you wish  to take that approach, you’ll have to count the number of elements equal to the  median and delete the correct number of them.

Finally, the argument only shows that the <em>amortized</em> cost with respect to \phi is  O(m). The conclusion we’re asked for requires a technical condition: the potential  \phi never drops below its initial value. This is true for the usual reason: initially,  \phi = 0 because S is empty; during execution, \phi \geq 0  by definition.

7 0
3 years ago
____ is the code of acceptable behaviors users should follow while on the internet; that is, it is the conduct expected of indiv
andriy [413]
The Computer Fraud and Abuse Act.
7 0
3 years ago
A county collects property taxes on the assessed value of property, which is 60 percent of its actual value. For example, if a h
Zolol [24]

Answer:

actual_value = float(input("Enter the actual value of a piece of property: "))

tax_rate = float(input("Enter the current tax rate for each $100.00 of assessed value: "))

assessed_value = actual_value * 0.6

tax = (assessed_value * tax_rate) / 100

print("The annual property tax is $" + str(tax))

Explanation:

*The code is in Python.

Ask the user to enter the actual value and the tax rate

Calculate the assessed value, multiply the actual value by 0.6

Calculate the tax, multiply the assessed value by the tax rate and divide result by 100

Print the tax

7 0
3 years ago
Data mining requires specialized data analysts to ask ad hoc questions and obtain answers quickly from the system. select one: t
rjkz [21]

Specialized data analysts are needed for data mining in order to ask ad hoc inquiries and swiftly get responses from the system. choose one. This claim is false.

<h3>What does data mining mean exactly?</h3>
  • Large data sets are sorted through in data mining in order to find patterns and relationships that may be used in data analysis to assist solve business challenges.
  • Enterprises can forecast future trends and make more educated business decisions thanks to data mining techniques and technologies.
  • Increasingly huge databases are explored via data mining, which also helps market segmentation.
  • It is feasible to predict a customer's behavior to guide personalized loyalty marketing by analyzing the links between criteria like their age, gender, and preferences.

To learn more about Data mining, refer to:

brainly.com/question/2596411

#SPJ4

5 0
2 years ago
Other questions:
  • Dial-up connections can be made over a(n) ____ line or phone line. isdn dsl ipx tcp/ip
    12·1 answer
  • If reading or writing a cache line of size 64 bytes to Flash requires 2.56 μJ and DRAM requires 0.5 nJ, and if idle power consum
    9·1 answer
  • 1.
    5·2 answers
  • A real-world problem that might be explained or predicted through the creation of a computer simulation
    7·1 answer
  • Some data files should be totally hidden from view, while others should have ____ so users can view, but not change, the data.
    11·1 answer
  • What is an operating system? What are the main functions of a modern general purpose operating system?
    7·1 answer
  • What tells the hardware what to do and how to do it?
    9·1 answer
  • Please what do you guys think about this ?
    10·2 answers
  • Which of the following tabs on the Ribbon contains the command to add a Quick Part to a document? A Design B Insert C View D Hom
    7·1 answer
  • Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!