1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Morgarella [4.7K]
3 years ago
5

Why are security measures protecting gdp data so strict?

Computers and Technology
1 answer:
Semenov [28]3 years ago
7 0
The stock market would behave very differently if people had easy access to that data.
You might be interested in
Which program will have the output shown below?
kumpel [21]

for count in range(5, 8):

   print(count)

This will produce.

5

6

7

I hope this helps!

5 0
3 years ago
Which of the following can potentially be changed when implementing an interface?
yan [13]

Answer:

c. You cannot change the name, return type, or parameters of a method defined by the interface.

Explanation:

When implementing an interface:

  • The return type of the implementing method should be same as the one defined in the interface.
  • The parameters of the implementing method should be the same as defined in the interface.
  • The name of the method should be the same as that defined in the interface.

So among the given options , option c is the most relevant as it captures all the above conditions.

6 0
4 years ago
How can you make your MakeCode micro:bit program display either the letter<br> A or the letter B?
Liula [17]

Answer:

Use a random number and control structure to decide which letter is displayed.

Explanation:

8 0
2 years ago
Consider the following high-level recursive procedure: long long int flong long int n, long long int k long long int b b k+2; if
Stolb23 [73]

Answer:

f(long long, long long):

push rbp

mov rbp, rsp

push rbx

sub rsp, 40

mov QWORD PTR [rbp-40], rdi

mov QWORD PTR [rbp-48], rsi

mov rax, QWORD PTR [rbp-48]

add rax, 2

mov QWORD PTR [rbp-24], rax

cmp QWORD PTR [rbp-40], 0

jne .L2

mov QWORD PTR [rbp-24], 8

jmp .L3

.L2:

mov rax, QWORD PTR [rbp-40]

lea rdx, [0+rax*4]

mov rax, QWORD PTR [rbp-24]

lea rbx, [rdx+rax]

mov rax, QWORD PTR [rbp-48]

lea rdx, [rax+1]

mov rax, QWORD PTR [rbp-40]

sub rax, 1

mov rsi, rdx

mov rdi, rax

call f(long long, long long)

add rax, rbx

mov QWORD PTR [rbp-24], rax

.L3:

mov rdx, QWORD PTR [rbp-24]

mov rax, QWORD PTR [rbp-48]

add rax, rdx

add rsp, 40

pop rbx

pop rbp

ret

Explanation:

8 0
3 years ago
The ArrayList class contains a trim method that resizes the internal array to exactly the capacity. The trim method is intended
andreev551 [17]

Answer:

public void trimToSize() {

modCount++;

if (size < elementData.length) {

elementData = (size == 0)

? EMPTY_ELEMENTDATA

: Arrays.copyOf(elementData, size);

}

}

Now, the running time for copyOf() function is O(N) where N is the size/capacity of the ArrayList. Hence, the time complexity of trimToSize() function is O(N).

Hence, the running time of building an N-item ArrayList is O(N^2).

Please find the sample code below.

CODE

==================

import java.util.ArrayList;

public class Driver {

  public static void main(String[] args) throws Exception{

      int N = 100000;

      ArrayList<Integer> arr = new ArrayList<>(N);

     

      long startTime = System.currentTimeMillis();

      for(int i=0; i<N; i++) {

          arr.add(i);

          arr.trimToSize();

      }

      long endTime = System.currentTimeMillis();

      double time = (endTime - startTime)/1000;

      System.out.println("Total time taken = " + time + " seconds.");

  }

}

Explanation:

5 0
4 years ago
Other questions:
  • The item in this illustration that is highlighted is the _____. quick access tool bar view buttons status bar zoom control
    10·2 answers
  • Please help me please
    6·1 answer
  • How do you know if your phone has a virus?
    13·1 answer
  • What is data? and types ??
    9·2 answers
  • You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dim
    10·1 answer
  • Discuss the difference between a broad internet search and a narrow internet search?
    12·2 answers
  • Which element of a presentation program’s interface displays the slide you are currently creating or editing?
    14·2 answers
  • The relation LIBRARY records books currently on loan to students. Each book has one ISBN_NO The library has several copies of ea
    14·1 answer
  • If you were practicing keyboarding and the exercise contained the letters j, k, l, m, n, and b, what section of the
    14·1 answer
  • Question: 11
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!