1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
9

Assuming P != NP, which of the following is true ?

Computers and Technology
2 answers:
7nadin3 [17]3 years ago
8 0

Answer:

B. NP-complete \cap P = \Phi

Explanation:

The is because no NP-Complete problem can be solved in polynomial time.

Assuming one NP-Complete problem can be solved in polynomial time, then all NP problems can solved in polynomial time. If that is the case, then NP and P set become same which contradicts the given condition.

White raven [17]3 years ago
7 0

Answer:

Answer is B, see explanations.

Explanation:

Answer is (B) NP−complete∩P=ϕ

Since, P≠NP, there is at least one problem in NP, which is harder than all P problems. Lets take the hardest such problem, say X. Since, P≠NP,X∉P .

Now, by definition, NP−complete problems are the hardest problems in NP and so X problem is in NP−complete. And being in NP, X can be reduced to all problems in NP−complete, making any other NP−complete problem as hard as X. So, since X∉P, none of the other NP−complete problems also cannot be in P.

You might be interested in
Consider the following business environment.
ale4655 [162]

Answer:

Check the explanation

Explanation:

C-> OLAP systems allow users to analyze database information from multiple database systems at one time. The primary objective is data analysis and not data processing.

D-.Airlines use the Data Mining Techniques to improve Customer Service.

Kindly check the attached image below to see the step by step explanation to the question above.

7 0
3 years ago
List the step in turning on a computer
kondaur [170]
On the CPU first and then then the power button if there is password access then u have to type the password
this Much only
hope it helps :)
7 0
3 years ago
_____ uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment.
mr_godi [17]

Answer:

"Virtual reality" is the appropriate answer.

Explanation:

The utilization of technological advances gives the impression of a 3D interactive environment wherein the things that have such a perception of space embodiment or involvement, are considered as Virtual reality.

Virtual reality implementations often include:

  • Entertainment,
  • Medical and
  • Educational activities.
3 0
3 years ago
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
Talia was a scientist whose research compared the birth rates of young women of a New England community over the course of five
podryga [215]

Answer: b

Explanation: for me personally i will populate an infographic(chart)rather than essay form i prefer to use an infographic to show my anaylis how it went high or low or when.

8 0
3 years ago
Read 2 more answers
Other questions:
  • The ________ of the operating system enables the user to communicate with the computer system. Select one:
    9·1 answer
  • What is the name of small programs stored on the hard drive that tell the computer how to communicate with a specific hardware d
    5·1 answer
  • A __________ network is good for connecting computers over boundaries.
    6·2 answers
  • Diane is receiving a lot of unwanted e-mail. What steps can she take to reduce the amount of e-mail she receives?
    12·1 answer
  • What memory stores instructions that tell the computer how to start up?
    10·1 answer
  • Tech Town has been hit with a bad storm and the town is suffering from severe flooding. The kids have no way to get to school.Te
    7·1 answer
  • Which expression is equivalent to 3x + 3x + 3x?<br><br> From Performance Matters
    11·2 answers
  • This is my paragraph . The type of color is ude in this code line is ..............................
    5·1 answer
  • Question #2
    8·2 answers
  • "a web client that connects to a web server, which is in turn connected to a bi application server, is reflective of a"
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!