1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grigory [225]
3 years ago
9

Being nice take the points​

Computers and Technology
1 answer:
MArishka [77]3 years ago
4 0

Answer:

Sure!!! and thank you very much

You might be interested in
Suppose we are given an arbitrary digraph G = (V, E) that may or may not be a DAG. Modify the topological ordering algorithm so
lianna [129]

Answer:

Check the explanation

Explanation:

We can utilize the above algorithm with a little in modification. If in each of the iteration, we discover a node with no inward edges, then we we’re expected succeed in creating a topological ordering.

If in a number of iteration, it becomes apparent that each of the node has a minimum of one inward edge, then there must be a presence of cycle in the graph.

So our algorithm in finding the cycle is this: continually follow an edge into the node we’re presently at (which is by choosing the first one on the adjacency list of inward edges to decrease the running time).

Since the entire node has an inward edge, we can do this continually or constantly until we revisit a node v for the first time.

The set of nodes that we will come across among these two successive visits is a cycle (which is traversed in the reverse direction).

3 0
3 years ago
You are the IT administrator for a small corporate network. The employee in Office 1 occasionally needs a previous version of he
ladessa [460]

Answer:

Explanation:

Assuming you have Windows 8 or 10 as the operating system, you would need to do the following. In the search input in the taskbar search for "Create a System Restore Point". In this window, navigate to the System Protection tab. Here, you need to click on the drive you want, we can do C first, and click on the button that says "configure". Here you want to turn on System Protection and set the disk space to 5%. Now click apply and ok and repeat for drive D.

Once that is done you will need to create a manual restore point by clicking the button that says create and giving it the name of your choice.

7 0
2 years ago
Amelie lists her dishwasher for sale on eBay. Ryan, who lives in another city, bids for the best price and uses his credit card
NemiM [27]

Answer:

Yes

Explanation:

e-commerce or electronic commerce is an online platform, where web technologies is used as a medium for business transaction between a buyer and a seller.

The e-commerce platform provides the online marketplace and the electronic payment medium for customers of an e-store to easily acquire the products and services they need.

eBay is an example of an e-commerce website that provides individuals with the medium to sell and buy what they need.

8 0
3 years ago
WILL GIVE BRAINLIEST!! 20 PNTS!!!
Anettt [7]

Answer:

C 1,2,3,4

Explanation:

This means I want to count from 0-4 and set it o the current loop I am currently on.

for i in range(0, 5):

 print("i currently equals: ", i)

The result will be

i currently equals: 0

i currently equals: 1

i currently equals: 2

i currently equals: 3

i currently equals: 4

8 0
3 years ago
Read 2 more answers
John, an ethical hacker, is demonstrating a proof-of-concept IoT attack. For this demonstration, he used a jammer to jam and sni
scoundrel [369]

Answer:

BlueBorne Attack

Explanation:

If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.

Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication

Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.

4 0
3 years ago
Other questions:
  • How do open online courses help with independent learning? (1 point)
    13·2 answers
  • What is the decimal equivalent of (11000 + 10000)/101?
    10·1 answer
  • def getCharacterForward(char, key): """ Given a character char, and an integer key, the function shifts char forward `key` steps
    9·1 answer
  • On an open book test, Anna was asked to predict how American laws may affect the Mexican way of life if the US Constitution was
    15·1 answer
  • _______is a term which describes how the operating system will interrupt the execution of an application when an application of
    14·1 answer
  • You are a network consultant who has been asked to attend an initial meeting with the executive management team of ElectroMyCycl
    10·1 answer
  • Which of the following are input devices? Check all that apply.
    9·2 answers
  • What is a cloud in the world of computing
    7·1 answer
  • STOP DELETING MY ANSWERS AND QUESTIONS!!!!!!!
    9·1 answer
  • If an internet document identifies its author but says nothing about her or his qualifications, your textbook recommends that yo
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!