1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
3 years ago
8

The weird suspicious box that k12 sends the parents to put on the router. im getting strange privacy error messages on google an

d silk on every single device i try that ive never gotten before my parents put the box on our router. i used to get redirected to "meetbluecircle.com" but now it just does this error and im so annoyed and mad and just freaking confused out of my mind about how i get these errors to go away becuase its blocking any site i try to go to.EVEN THE FREAKING HELP FORUM FOR GOOGLE!!!!Please help me im going crazy trying to figure out how the heck i get this to go the frick away
Computers and Technology
1 answer:
lorasvet [3.4K]3 years ago
7 0

Answer:

34

Explanation:

WHY BECAUSE 34 IS PRIME AND THIS PROBLEM REDUCE THE NUMBER AND CHANGE THE NUMBER INTO A MIXED NUMBER

You might be interested in
What is the task included in the information systems manager?​
kobusy [5.1K]

Answer:

research and install new systems and networks. implement technology, directing the work of systems and business analysts, developers, support specialists and other computer-related workers. evaluate user needs and system functionality, ensuring that IT facilities meet these needs.

Explanation:

5 0
3 years ago
My friend Leo wants to have an emergency plan for his final exams on University of Southern Algorithmville. He has N subjects to
leonid [27]

Answer:

Greedy is an algorithmic paradigm that builds up a solution piece by piece, always choosing the next piece that offers the most obvious and immediate benefit. Greedy algorithms are used for optimization problems. An optimization problem can be solved using Greedy if the problem has the following property: At every step, we can make a choice that looks best at the moment, and we get the optimal solution of the complete problem.

If a Greedy Algorithm can solve a problem, then it generally becomes the best method to solve that problem as the Greedy algorithms are in general more efficient than other techniques like Dynamic Programming. But Greedy algorithms cannot always be applied. For example, the Fractional Knapsack problem (See this) can be solved using Greedy, but 0-1 Knapsack cannot be solved using Greedy.

The following are some standard algorithms that are Greedy algorithms.

1) Kruskal’s Minimum Spanning Tree (MST): In Kruskal’s algorithm, we create an MST by picking edges one by one. The Greedy Choice is to pick the smallest weight edge that doesn’t cause a cycle in the MST constructed so far.

2) Prim’s Minimum Spanning Tree: In Prim’s algorithm also, we create an MST by picking edges one by one. We maintain two sets: a set of the vertices already included in MST and the set of the vertices not yet included. The Greedy Choice is to pick the smallest weight edge that connects the two sets.

3) Dijkstra’s Shortest Path: Dijkstra’s algorithm is very similar to Prim’s algorithm. The shortest-path tree is built up, edge by edge. We maintain two sets: a set of the vertices already included in the tree and the set of the vertices not yet included. The Greedy Choice is to pick the edge that connects the two sets and is on the smallest weight path from source to the set that contains not yet included vertices.

4) Huffman Coding: Huffman Coding is a loss-less compression technique. It assigns variable-length bit codes to different characters. The Greedy Choice is to assign the least bit length code to the most frequent character. The greedy algorithms are sometimes also used to get an approximation for Hard optimization problems. For example, the Traveling Salesman Problem is an NP-Hard problem. A Greedy choice for this problem is to pick the nearest unvisited city from the current city at every step. These solutions don’t always produce the best optimal solution but can be used to get an approximately optimal solution.

6 0
3 years ago
Which type of word processing programs enables users to include illustrations within the program?
Nookie1986 [14]
Microsoft Word, Libre, and Google Docs have always enabled me to insert illustrations. Look for an image icon in the task icon, here you can select an image from your files. 
4 0
3 years ago
A spreadsheet contains the maximum weight and maximum height for fifty dog breeds. The breeds are located in rows, and the weigh
MrRa [10]

Answer:

a. Locate

Explanation:

Question options (obtained on the net):

a. Locate

b. Sort

c. Filter

d. Replace

Explanation:

The largest value of the weights of the dog breed in row 43 is the maximum weight of the dog breed in the row

The 'MAX' formula or the 'Autosum' tool can be used to give the largest value in a row, or column

To locate the maximum value in MS Excel, the ADDRESS and MATCH and MAX functions are combined and entered into the blank cell on the right, specifying the same range for the MAX and MATCH functions, and a '0' for the MATCH function as well as a '1' for the ADDRESS function as follows;

=ADDRESS(MATCH(MAX(A1:E1), A1:E1, 0), 1)

Therefore, to navigate to the maximum weight, Emily should use a <em>locate</em>(ing) tool navigate to the information on the spread sheet

8 0
3 years ago
Jacob wants to track the profiles of users who visit his Web site. He would like to store the user’s age, income, and location.
mario62 [17]
Spreadsheet

Description
A spreadsheet is a computer application for organization, analysis and storage of data in tabular form where Jacob can store the user’s information.
7 0
3 years ago
Other questions:
  • Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first
    6·1 answer
  • Ann, a user, reports that she is no longer able to access any network resources. Upon further investigation, a technician notice
    8·1 answer
  • Can i configure my entire network as a dmz
    6·1 answer
  • Clunker Motors Inc. is recalling all vehicles from model years 1995-1998 and 2004-2006. Given a variable modelYear write a state
    11·1 answer
  • ______ is the software that blocks a user from being able to access your computer.
    9·1 answer
  • To apply a style to one or more elements on a web page, configure a css ________.
    5·1 answer
  • A(n) _____ might be written by a programmer or it might be created through a DBMS utility program.
    6·1 answer
  • Which of the following is not one of the Generally Accepted Recordkeeping Principles ("The Principles®")? a. Accountability b. S
    11·1 answer
  • What is the most useful advantage of using the Slide Sorter view to rearrange slides instead of using the slide thumbnails in No
    13·1 answer
  • Can anyone give me $2 (Reddem code/Promo Code)​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!