1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spin [16.1K]
3 years ago
12

Which turn best describe news one is connected to the government and is used as a political tool more than as a business product

Computers and Technology
1 answer:
timurjin [86]3 years ago
4 0

to be honest i dont really know, sorry

You might be interested in
The algorithm credited to Euclid for easily finding the greatest common divisor of two integers has broad significance in crypto
Len [333]

Answer:

a. True                      

Explanation:

  • Euclid's algorithm for finding greatest common divisor of two integers is a very effective method which has importance in cryptography as it is being used in cryptographic schemes and algorithms.
  • This algorithm calculates gcd of  2 integers which is the largest number which divides both the integers.
  • The famous RSA public-key encryption technique also uses extended version of this algorithm to compute modular multiplicative inverse
  • Euclid algorithm is also used in Chinese remainder theorem.
  • This algorithm is not only used in cryptographic algorithm but is also used in breaking these cryptosystems using prime factorization as we know that factorization of large integers is very tough and the security of many cryptography systems depends on this.
5 0
3 years ago
Suppose as a computer programmer, you have been assigned a task to develop a program to store the sorted data in ascending order
shepuryov [24]

Answer:

In case the data is arranged in the ascending order, you can always change the Binary search tree into a Height BST, and which is also known as the self-balancing BT. And through this, it's quite on hand to better the operations like searching on the new BST. And these SBBTs are quite commonly made use of for constructing as well as maintaining the ordered list. This is the case in the case of the priority queue, and this is what is required here.

Explanation:

Please check the answer.

3 0
3 years ago
External hard drives typically connect to a computer via an external port (such as a usb or ____ port) or a wireless connection.
Marianna [84]

External hard drives typically connect to a computer via an external port (such as a USB or <u>thunderbolt</u> port) or a wireless connection.

<h3>What is a hard drive?</h3>

A hard drive can be defined as an electro-mechanical, non-volatile data storage device that is made up of magnetic disks (platters) that rotates at high speed.

In Computer technology, all hard drives are commonly installed on computers and other digital service for the storage of digital files and to enable the booting of a computer through its operating system (OS).

<h3>What is a memory?</h3>

A memory can be defined as a terminology that is used to describe the available space on an electronic device that is typically used for the storage of data or any computer related information such as:

  • Images
  • Videos
  • Texts
  • Music
  • Codes
  • Folders

In conclusion, all external hard drives typically connect to a computer through an external port such as a USB, <u>thunderbolt</u> port, or a wireless connection.

Read more on hard drive here: brainly.com/question/26382243

#SPJ1

8 0
11 months ago
Alpha Technologies, a newly established company, wants to share information about its work with people all over the world. Which
allochka39001 [22]
It should use the web server to be accessible to users of World Wide Web across the world
6 0
3 years ago
5. Why would you want to wear white or light colors on a summer day?
vfiekz [6]

A. White absorbs all light and reflects none so it is cooler.

3 0
3 years ago
Other questions:
  • . Dеclarе a onе-dimеnsional array of 30 doublеs (on thе stack) namеd rainfall
    11·1 answer
  • Plz help ASAP
    10·1 answer
  • Consider a binary-search method in an array that reports whether an object is in the array. The documentation indicates that the
    11·1 answer
  • What provision of the Government Paperwork Elimination Act was designed to encourage a paperless society?
    6·2 answers
  • What made it possible to develop personal computers?
    10·2 answers
  • The head of small organization wants to install a network so that all the employees of different department can share various re
    14·1 answer
  • 17. What are the basic modes of operation of 8255?Write the features of mode 0 in 8255?
    8·1 answer
  • Which of the following are drivers of machine learning growth?
    15·1 answer
  • What is another term used for next generation firewalls
    12·1 answer
  • Explain the following IT terms Network: Packet: Router: IP address: Server: LAN: WAN: Bus topology: Ring topology: Star topology
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!