1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
6

I need help look at pic

Computers and Technology
1 answer:
S_A_V [24]3 years ago
8 0

Answer:

ok

Explanation:

where is the pic that u want us to have a look at

You might be interested in
What is difference between RAM and ROM?
Lesechka [4]
Hi pupil here's your answer ::


________________________

RAM ::

● Data can be read and written on the RAM chip at any number of times.

● The operating system, application programs and the user data is stored in Ram only until the computer is powered on.

● Ram is a volatile memory that loses its contents when the computer is switched off.

● The size of RAM makes a difference in the processing, i.e. the bigger size of the RAM the greater is the speed of processing.

ROM ::

● Data can only be read from the ROM chip.

● Only system programs are stored in ROM. It can't be used to store user data and other programs.

● ROM is non volatile memory the data stored in ROM is permanent in nature.

● Size of the ROM has nothing to do with processing.


________________________

hope this helps. . . .
5 0
4 years ago
People without digital literacy skills are often the victims of
Arturiano [62]

scams or identity fraud

7 0
4 years ago
Suppose we compute a depth-first search tree rooted at u and obtain a tree t that includes all nodes of g.
Temka [501]

G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

<h3>What are DFS and BFS?</h3>

An algorithm for navigating or examining tree or graph data structures is called depth-first search. The algorithm moves as far as it can along each branch before turning around, starting at the root node.

The breadth-first search strategy can be used to look for a node in a tree data structure that has a specific property. Before moving on to the nodes at the next depth level, it begins at the root of the tree and investigates every node there.

First, we reveal that G exists a tree when both BFS-tree and DFS-tree are exact.

If G and T are not exact, then there should exist a border e(u, v) in G, that does not belong to T.

In such a case:

- in the DFS tree, one of u or v, should be a prototype of the other.

- in the BFS tree, u and v can differ by only one level.

Since, both DFS-tree and BFS-tree are the very tree T,

it follows that one of u and v should be a prototype of the other and they can discuss by only one party.

This means that the border joining them must be in T.

So, there can not be any limits in G which are not in T.

In the two-part of evidence:

Since G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

The complete question is:

We have a connected graph G = (V, E), and a specific vertex u ∈ V.

Suppose we compute a depth-first search tree rooted at u, and obtain a tree T that includes all nodes of G.

Suppose we then compute a breadth-first search tree rooted at u, and obtain the same tree T.

Prove that G = T. (In other words, if T is both a depth-first search tree and a breadth-first search tree rooted at u, then G cannot contain any edges that do not belong to T.)

To learn more about  DFS and BFS, refer to:

brainly.com/question/13014003

#SPJ4

5 0
2 years ago
How to create a shortcut to a website on your desktop?.
dusya [7]

Answer:

open web browser, open your favorite website or webpage, right click on the web address located in the address bar of your web

3 0
2 years ago
What can cause a Lenovo computer to be very slow right after after turning it on?
emmasim [6.3K]

Explanation:

There are many quick fixes that even novice computer users can make to ... When all else fails, you can resort to reinstalling Windows.

8 0
3 years ago
Other questions:
  • What is an (CR) Optical character recognition?
    13·2 answers
  • Most internet connections use what transmission
    13·2 answers
  • What are some causes of the number of bytes on the wire exceeding the number of bytes being captured?
    6·2 answers
  • A microphone is a type of electronic.<br><br> True/Faulse
    14·1 answer
  • Use a logical OR to write a more concise equivalent of the following code:
    11·1 answer
  • What are the opportunities, and challenges, forged by digital transformation?
    13·1 answer
  • To uncompress the data back into its original binary state, you simply reverse the process. This technique is an example of what
    7·1 answer
  • Select the correct text in the passage.
    11·1 answer
  • The color in a circle is a _____________ data type.
    13·1 answer
  • What is edge computing?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!