1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olenka [21]
3 years ago
9

Steps for assessing the tabs dialog box

Computers and Technology
1 answer:
lapo4ka [179]3 years ago
5 0

Answer:

A dialog box what that

Explanation:

sorry 1 c3 your times 5

You might be interested in
Determine the efficiency and big-O notation for the following algorithm:
Anon25 [30]

Answer and Explanation:

To calculate Big O, go through each line of code and determine O(!), O(n) and return your calculation.

For example,

In O (5 +6n), where 6 5 represent five instances of O(1), and 6 represent the 6 O(n).

We compute the time complexity of the algorithm. We get the result, just an estimation. In given algorithms, run time in milliseconds has been provided, such as in T (1) algorithm process in 512 milliseconds and T(2) algorithms process 8129 milliseconds. But big O notation not measured in milliseconds. Information given is not enough to calculate the big O notation.

       

8 0
4 years ago
A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
Sindrei [870]

Answer:

The appropriate response will be "Public key".

Explanation:

  • A public key would be created in something like such key encryption cryptography consisting incorporates asymmetric encryption of the keys algorithms.
  • Those same keys have been utilized to transform a document to even such an unintelligible form. Decryption consists done using only a separate, however corresponding, secret address or private key.
6 0
3 years ago
Respond to the following in 2-5 paragraphs. Give an example of how you can demonstrate active listening.
nadezda [96]
Hey my name is ..... and this do the thesis
8 0
3 years ago
What are 2 ways to send a message to your client when signed in as an accountant user?.
7nadin3 [17]

Answer:

The use of Ask client and request are 2 ways to send a message to your client when signed in as an accountant user.

4 0
2 years ago
________ includes reviewing transactoin logs and uses real-time monitoring to find evidence
denpristay [2]

Complete Question:

________ includes reviewing transaction logs and uses real-time monitoring to find evidence.

Group of answer choices

A. Log analysis

B. Network analysis

C. Code analysis

D. Media analysis

Answer:

B. Network analysis

Explanation:

Network analysis includes reviewing transaction logs and uses real-time monitoring to find evidence. Network analysis is a form of computer forensic service, which involves the scientific process of identifying, capturing and analyzing or examining data that are stored on digital devices in an electronic format, for the sole purpose of unraveling the truth about an allegation such as fraud, without preempting the outcome of the investigation.

Network analysis involves the use of network analyzers such as a sniffing and tracing tool to analyze or examine network traffic in real-time. Some examples of network analyzing tools are netdetector, tcpdump, pyflag, networkminer, xplico, tsat, wireshark, omnipeek, etc.

<em>Please note, network analysis is also known as network forensics in computer science.</em>

4 0
3 years ago
Other questions:
  • What is one way in which tablets differ from laptops and notebooks
    12·2 answers
  • When a job is sent to other countries, as many programming jobs have been, it is said to have been datamined.
    11·1 answer
  • Represent the logic of a program that allows the user to enter a value for one edge of a cube. The program calculates the surfac
    10·1 answer
  • Can java scanner not take in a negative input?
    11·1 answer
  • Which operation on a pwc requires more than idle speed?
    8·1 answer
  • Frank accidently overwrote his old document with a new document of the same name. He'd like to get his old document back. What f
    10·1 answer
  • Which item is used for formatting in responsive web design?
    14·2 answers
  • Of the following potential benefits, which is LEAST likely to be provided by the upgraded system?
    12·1 answer
  • Who has pad let and wants to talk
    15·2 answers
  • How many micro processors will a small computer have? A. none B. two C. one D. three
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!