1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Basile [38]
4 years ago
15

When should you save your document?

Computers and Technology
2 answers:
Verdich [7]4 years ago
4 0

Answer:

b. when you have completed a document

const2013 [10]4 years ago
3 0

B - When you have completed a document.

You might be interested in
Using computers can lead to a number of physical safety issues. State and explain TWO(2) of these types of issues.​​​​​
Ira Lisetskai [31]

The types of issues that is seen are:

  • Electrocution
  • Fire
  • Tripping over wires and others.

<h3>What is the physical safety about?</h3>

There are a lot of of physical safety issues that can come up from using ICT devices.

A fire outbreak can occur if there is an issue with the wiring of the computer system or when there is too much voltage supplied and this is therefore a type of physical safety issues in the computer room.

Note that Electrocution is said to be the death or bad injury that is known to be caused as a result of an electric shock from electric current that tends to pass through the body.

Hence, The types of issues that is seen are:

  • Electrocution
  • Fire
  • Tripping over wires and others.

Learn more about Electrocution from

brainly.com/question/1810934

#SPJ1

6 0
2 years ago
Armando is trying to decide how he will alert players that the game is over in the new video game that he is designing. He is co
mojhsa [17]

Answer:

He is working on the outcome

Explanation:

Because this is the outcome if you fail or die and the other objectives are the following

operation: A single objective in a level of the the whole game

obstacles: Trying to stop the player like blocks or walls or traps

objective:The main goal of the game

8 0
3 years ago
You are given a list of n positive integers a1, a2, . . . an and a positive integer t. Use dynamic programming to design an algo
Anna11 [10]

Answer:

See explaination for the program code

Explanation:

The code below

Pseudo-code:

//each item ai is used at most once

isSubsetSum(A[],n,t)//takes array of items of size n, and sum t

{

boolean subset[n+1][t+1];//creating a boolean mtraix

for i=1 to n+1

subset[i][1] = true; //initially setting all first column values as true

for i = 2 to t+1

subset[1][i] = false; //initialy setting all first row values as false

for i=2 to n

{

for j=2 to t

{

if(j<A[i-1])

subset[i][j] = subset[i-1][j];

if (j >= A[i-1])

subset[i][j] = subset[i-1][j] ||

subset[i - 1][j-set[i-1]];

}

}

//returns true if there is a subset with given sum t

//other wise returns false

return subset[n][t];

}

Recurrence relation:

T(n) =T(n-1)+ t//here t is runtime of inner loop, and innner loop will run n times

T(1)=1

solving recurrence:

T(n)=T(n-1)+t

T(n)=T(n-2)+t+t

T(n)=T(n-2)+2t

T(n)=T(n-3)+3t

,,

,

T(n)=T(n-n-1)+(n-1)t

T(n)=T(1)+(n-1)t

T(n)=1+(n-1)t = O(nt)

//so complexity is :O(nt)//where n is number of element, t is given sum

6 0
3 years ago
What wireless networking radio frequency yields faster speeds but offers shorter range ?
QveST [7]
<span>The wireless networking radio frequency 5GHz yields faster speeds but offers shorter range .
</span>One hertz is one complete cycle per second. <span> In </span>wireless communications<span>, it refers to wave oscillation. </span>Higher frequency can mean a faster system.
8 0
3 years ago
¿Cuántos motores tiene el Toyota Prius y que características poseen?
ValentinkaMS [17]

Answer:

yo no se busca en gogle amiga

4 0
3 years ago
Other questions:
  • A virus that attaches to an executable program can do anything that the program is permitted to do.
    7·1 answer
  • The email administrator has suggested that a technique called SPF should be deployed. What issue does this address?
    5·1 answer
  • Your computer is once again out of hard drive and you want to see which folders are consuming the most space on your drive. Whic
    15·1 answer
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • Define the term unique key and give an example.
    6·1 answer
  • All information is clearly identified and easy to find within the source
    15·1 answer
  • Suppose you can access the caches in the local DNS servers of your department. Can you propose a way to roughly determine the We
    14·1 answer
  • It is an electronic device that capable of accessing accepting processing product and storing data​
    13·1 answer
  • Write a program that requests the user input a word, then prints every other letter of the word starting with the first letter.
    5·1 answer
  • How does technology affect our daily lives essay
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!