Answer:
360/number of sides
Explanation:
all the exterior angles add up to 360°
so to find each angle mesure, divide the 360 by the number of sides the figure has.
Answer:
C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.
Explanation:
Byte pair encoding is a form of encoding in which the most common pairs of consecutive bytes of data are replaced by a single byte which does not occur within the set of data.
For example, if we has a string ZZaaAb, it can be encoded if the pairs of string ZZ are replaced by X and the second pair by Y. So, our data now becomes XYAb.
To get our original data, that is decode it, we just replace the data with the keys X = ZZ and Y = aa thus allowing our original data to be restored.
Since our original string is restored without loss of data, it implies that <u>byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.</u>
You have to ask you teacher to show you which ones you got wrong and the answers to them.
Answer:
A problem is a challenging task or process that needs resources not available to the individual or group responsible for the task.
An example of a business problem is data analysis.
Explanation:
A business enterprise is driven by profit making. Investing in a business opportunity requires or demands for feasibility study. Without the right computer skills, a company dives into various physical forms of survey like giving questionnaires to potential clients.
This form of survey requires a lot of time and money that should be invested in other assets in the company and the data acquired, sometimes is not enough to make long term business decisions.
On the other hand, when a spreed sheet application is used (like microsoft excel) by a business data analyst with big data and data visualization skills, large data could be accessed online and analysed of a fast and efficient descriptive and predictive analysis for long term business decisions.
Answer:
confidentiality
Explanation:
Alice sends a message to Bob in a manner such that Bob is the only person who can tell what the real message is. Which security concept is this an example of