1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lerok [7]
3 years ago
15

What does N represent when analyzing algorithms?

Computers and Technology
1 answer:
Mademuasel [1]3 years ago
4 0

Answer: "N" is considered as the size of the input that is being given in the algorithm.

Explanation: During a problem solving process , a algorithm is used to analyze the problem . Many function and  steps are to be taken care of while analyzing algorithm. Among analyzing step, input is also given which is usually zero more than that . An input has a certain size which is given by the initial "N".  The input size defines the length of the string for the input.

You might be interested in
tomaso is explaining to a colleague the different types dns attacks. which dns attack would only impact a single user?
SIZIF [17.4K]

A DNS attack which would only impact a single user is: DNS poisoning attack.

DNS is an acronym for domain name system and it can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.

This ultimately implies that, a Domain Name System (DNS) is used to connect a uniform resource locator (URL) or a web address with their internet protocol (IP) address.

In Cybersecurity, there are different types of DNS attacks and these include:

  • ‎DNS flood attack.
  • DNS tunneling.
  • DNS poisoning attack.

DNS poisoning attack is a special type of Domain Name System (DNS) attack that is designed to only impact or affect a single user.

Read more: brainly.com/question/17273205

7 0
3 years ago
What is the part of the browser window that displays the content of the web page such as pictures and text called?
iragen [17]
The frame is a part of the web page or browser window
5 0
3 years ago
Which interest bearing account is best for people who won’t need access to their money for several months or longer?
lutik1710 [3]

The correct answer to this question is a certificate of deposit.

A certificate of deposit is an interest bearing account that pays a higher rate of interest than a savings account or interest bearing checking account because you are committing to leave it in the bank for a specified period of time. The CD could be for serveral months, or extend out to multiple years. Normally the interest rate will increase as the length of time increases.

3 0
3 years ago
Provide an example by creating a short story or explanation of an instance where availability would be broken.
ryzh [129]

Incomplete/Incorrect question:

Provide an example by creating a short story or explanation of an instance where confidentiality would be broken.​

<u>Explanation:</u>

Note, the term confidentiality refers to a state or relationship between two parties in which private information is kept secret and not disclosed by those who are part of that relationship. Confidentiality is broken when this restricted information is disclosed to others without the consent of others.

For instance, a Doctor begins to share the health information of a patient (eg a popular celebrity, etc) with others such as his family members and friend

s without the consent of the celebrity.

6 0
3 years ago
You are informed that all the users within the network are unable to access the Internet. You decide to start troubleshooting fr
sveticcg [70]

Answer: Bottom up approach

Explanation:

We should start from the bottom i.e.starting from the physical layer by inspecting the lan, switches, router and also as we move up the level we also need to check the software application and the various routing protocols at each successive levels.

Hence, we use bottom up approach.

3 0
3 years ago
Other questions:
  • How to set a prperty to all intems in array c#
    15·1 answer
  • What type of encoding is this?<br>0x6a656c6c7966697368<br>cause I'm trying to decode it
    5·1 answer
  • Which of the following keys on a keyboard allows you to select multiple cells located in different parts of your worksheet?
    13·2 answers
  • Consider the problem of finding the distance between the two closest numbers in an array of n numbers. (The distance between two
    13·1 answer
  • Should a social network own our social data? Is it an invasion of privacy for social networks to collect and use the information
    6·1 answer
  • Which button could Pamela press in the Microsoft Word spell checker to make the word “colour” instantly change to “color” whenev
    11·1 answer
  • An actual printout of computer data always satisfies the best evidence rule?
    12·1 answer
  • In saving a Visual Basic project properly , which of the following: two components part are involved ?
    6·1 answer
  • ________ is a human-computer interaction method whereby inputs to and outputs from a computer-based application are in a convent
    8·1 answer
  • Read the scenario and answer the question:
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!