1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergiy2304 [10]
3 years ago
6

Which if the following is an effect of intellectual property theft?

Computers and Technology
2 answers:
Leno4ka [110]3 years ago
8 0
Record companies lose money because people download songs for free.
zhannawk [14.2K]3 years ago
7 0
Record companies lose money bc ppl download songs for free
You might be interested in
The running time of Algorithm A is (1/4) n2+ 1300, and the running time of another Algorithm B for solving the same problem is 1
Mnenie [13.5K]

Answer:

Answer is explained below

Explanation:

The running time is measured in terms of complexity classes generally expressed in an upper bound notation called the big-Oh ( "O" ) notation. We need to find the upper bound to the running time of both the algorithms and then we may compare the worst case complexities, it is also important to note that the complexity analysis holds true (and valid) for large input sizes, so, for inputs with smaller sizes, an algorithm with higher complexity class may outperform the one with lower complexity class i.e, efficiency of an algorithm may vary in cases where input sizes are smaller & more efficient algorithm might be outperformed by the lesser efficient algorithms in those cases.

That's the reason why we consider inputs of larger sizes when comparing the complexity classes of the respective algorithms under consideration.

Now coming to our question for algorithm A, we have,

let F(n) = 1/4x² + 1300

So, we can tell the upper bound to the function O(F(x)) = g(x) = x2

Also for algorithm B, we have,

let F(x) = 112x - 8

So, we can tell the upper bound to the function O(F(x)) = g(x) = x

Clearly, algorithmic complexity of algorithm A > algorithmic complexity of algorithm B

Hence we can say that for sufficiently large inputs , algorithm B will be a better choice.

Now to find the exact location of the graph in which algorithmic complexity for algorithm B becomes lesser than

algorithm A.

We need to find the intersection point of the given two equations by solving them:

We have the 2 equations as follows:

y = F(x) = 1/4x² + 1300 __(1)

y = F(X) = 112x - 8 __(2)

Let's put the value of from (2) in (1)

=> 112x - 8 = 1/4x² + 1300

=> 112x - 0.25x² = 1308

=> 0.25x² - 112x + 1308 = 0

Solving, we have

=> x = (112 ± 106) / 0.5

=> x = 436, 12

We can obtain the value for y by putting x in any of the equation:

At x=12 , y= 1336

At x = 436 , y = 48824

So we have two intersections at point (12,1336) & (436, 48824)

So before first intersection, the

Function F(x) = 112x - 8 takes lower value before x=12

& F(x) = 1/4x² + 1300 takes lower value between (12, 436)

& F(x) = 112x - 8 again takes lower value after (436,∞)

Hence,

We should choose Algorithm B for input sizes lesser than 12

& Algorithm A for input sizes between (12,436)

& Algorithm B for input sizes greater than (436,∞)

8 0
3 years ago
What are point to consider while running occupation?​
mart [117]

Answer:

if you mean running a business, i think you should have a budget and enough inventory depending on what you're selling.

Explanation:

8 0
3 years ago
Read 2 more answers
Computer forensics is practiced _____. A. Only by specially trained government and law-enforcement personnel B. By many organiza
laiz [17]

Answer:

Option B is the correct answer.

<h3>Computer forensics is practiced by many organizations, including public- and private-sector organizations such as hospitals, law enforcement, and businesses. </h3><h3 />

Explanation:

Computer forensics can be defined as a branch of digital forensics that deals with the evidences and and proofs found on all digital storage media such as computers.

It is basically a step for enhancing security bases of communication. Therefore it is mainly used by law-enforcement personnel but it can also be practiced by other institutions for the purpose of self security.

<h3>I hope it will help you!</h3>
4 0
3 years ago
Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software progra
Dovator [93]

Answer:

Software packages.

Explanation:

Prewritten, commonly available software programs that has been applied here as software packages which completely remove the requirement of the organization to compose the own computer programs for all of these functionalities.

Software package is one of the collection of the program inside which the user get all useful applications or software as well as software module that meet their requirements.

6 0
4 years ago
Which of the following can you do after switching to Outline view? Select all the options that apply.
Lina20 [59]

On PowerPoint, the tasks that can be performed after switching to Outline view include:

a. Change the level of text.

c. Move text within a slide.

d. View an outline of the presentation.

PowerPoint can be defined as a software application (program) that is generally designed and developed by Microsoft Inc., to avail its end users an ability to create multiple slides containing textual and multimedia information which can be used during a presentation.

Generally, there are five (5) main view that are available in PowerPoint and these include:

  • Normal view
  • Reading view
  • Notes page
  • Slide sorter
  • Outline view

An outline view allows an end user to see a whole (entire) presentation in logical order. Thus, the presentation is displayed as an outline comprising the titles and main text from each slide of the presentation.

Hence, the tasks that can be performed after switching to Outline view include:

1. Change the level of text.

2. Move text within a slide.

3. View an outline of the presentation.

Read more: brainly.com/question/19543735

4 0
3 years ago
Other questions:
  • Question # 6
    13·1 answer
  • Give two reasons to break up
    11·2 answers
  • _____ are skilled computer users who try to gain unauthorized access to other people’s computers.
    15·1 answer
  • Conduct online research on web authentication and define what it is. Describe different authentication methods
    5·1 answer
  • What is call by reference in function of c​
    13·1 answer
  • Given an int variable n that has already been declared and initialized to a positive value, and another int variable j that has
    9·1 answer
  • What is the best way to set up the spreadsheet? List each expense in a row. List each income source in a column. List each expen
    15·2 answers
  • "If possible, always bring print-outs of your slides for your audience
    7·2 answers
  • SHORT ANSWERS:
    7·1 answer
  • You are setting up a home network for your friend. She has students visiting her home regularly for lessons and wants to provide
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!