1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vivado [14]
3 years ago
5

FREE 25 POINTS

Computers and Technology
2 answers:
Savatey [412]3 years ago
6 0

OOF

all i gotta say...

cause that SUCKS.

shtirl [24]3 years ago
4 0

Answer:

55⁵5555⁵55555555555555555

You might be interested in
To gain experience of using and combing different sorting algorithms: election sort, insertion sort, merge sort, and quick sort.
ch4aika [34]

Answer:

Motivation? The search problem.

Sorting algorithms: insertion sort, shellsort, heapsort, mergesort, quicksort, bubblesort

At the very least, "general purpose" sorting algorithms require O(n log n) comparisons

Explanation:

3 0
4 years ago
So this is what i use to code and all of that
givi [52]

Answer: yeah!

Explanation:

Have a good day!

5 0
3 years ago
Define what is meant by an entity in a data model. How should an entity be named? What information about an entity should be sto
AURORKA [14]

Answer:

Check the explanation

Explanation:

An entity can be a person, place, thing, or even an event about which data is collated and stored. Entities names usually are nouns.

The Entity Data Model (EDM) is an extensive model of the Entity-Relationship model which identifies the conceptual model of the data using a variety of modeling technique. It acan also be termed as a set of concepts that illustrates data structure, regardless of its stored form.

The Information stored or can be stored in a CASE repository regarding an entity includes:

Name

Definition

Special Notes

7 0
3 years ago
The packet storm web site includes a large collection of packaged shellcode, including code that can:_____.
elena55 [62]

The packet storm web site includes a large collection of packaged shellcode, including code that can create a reverse shell that connects back to the hacker, flush firewall rules that currently block other attacks, and set up a listening service to launch a remote shell when connected to.

6 0
2 years ago
How do you measure the capacity of speed and memory of computer system<br>Explain.​
jeka94
Im sorry i just need points
3 0
3 years ago
Other questions:
  • In a linux script, the line ____ is important because it identifies the file as a script.
    5·1 answer
  • Dose the internet bring people together?
    15·1 answer
  • The special operator used to check for similar character strings is ____.
    13·1 answer
  • Rachel needs to include a new organizational chart in her project. Which type of illustration should she use?: *
    11·1 answer
  • What is the best way to set up the spreadsheet? List each expense in a row. List each income source in a column. List each expen
    15·2 answers
  • Took some photos today for photography class what do you think??
    13·2 answers
  • What would a system unit that is integrated with the display and keyboard would be considered?
    6·1 answer
  • . In an airport, a system consisting of sensors, bar code readers and remote controls is MOST LIKELY used for
    12·2 answers
  • how is a two-dimensional array different from a traditional one dimensional array? From an ArrayList?
    6·1 answer
  • Which device is used to direct the flow of data on a computer network?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!