Answer:
By Using the Greedy- Activity- Selection algorithm
Explanation:
The Greedy- Activity- Selection algorithm in this case involves
First finding a maximum size set S1, of compatible activities from S for the first lecture hall.
Then using it again to find a maximum size set S2 of compatible activities from S - S1 for the second hall.
This is repeated till all the activities are assigned.
It requires θ(n2) time in its worse .
Answer: False
Explanation:
The statement in the question is wrong. When measuring processor speed, a megahertz is slower than a gigahertz.
We should note that:
1 megahertz = 1 million cycles per second
1 gigahertz = 1 billion cycles per second.
Therefore, we can see that a gigahertz is faster than a megahertz.
Answer:
Option (A) is the right answer.
Explanation:
According to the scenario, the user system is giving the error of invalid certificate while other users on the same network do not report any error, which means that there is some problem in a particular system.
Date and time can also be one of the main cause of this error because wrong date and time creates problem in surfing many websites by giving certificate error.
Hence the most appropriate answer is option (A).
While other option are wrong because of the following reasons:
- UEFI boot mode is mainly used in booting the operating system and has no connection with network.
- Logon time is also wrong because if the problem is with the login server, it can not give certificate error.
- User access control is also not correct because it is used to control the access of the user.
Answer:
1. A browser is used to access websites and web pages whereas a search engine is used to search for particular information.
2. Indexing is the process by which search engines organise information before a search to enable super-fast responses to queries.
3.Search engines are used to find specialized data rapidly whereas web directory is used to find a list of different sites.
4. The working behind the PageRank algorithm is that a page with a large number of in- links(a link from an important page) to it, then its outgoing links to other pages also become important. It gives more importance to back links of a web page and propagates the ranking through links.
5. Look for Sites from Established Institutions 2. Look for Sites with Expertise 3. Steer Clear of Commercial Sites 4. Beware of Bias 5. Check the Date 6. Consider the Site's Look 7. Avoid Anonymous Authors 8. Check the Links
Explanation:
Mobile device management is a type of security software used by an IT department to monitor, manage, and secure employees' mobile devices (laptops, smartphones, tablets, etc.) that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization.