1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denpristay [2]
3 years ago
11

I'd: 9872093250, password: qqqqq, join the meeting​

Computers and Technology
1 answer:
jenyasd209 [6]3 years ago
8 0
No thanks but Happy Mother’s Day!!!
You might be interested in
In the ISO/IEC 27002 framework, _________________ describes the use and controls related to encryption.
Nezavi [6.7K]

Answer:

In the ISO/IEC 27002 framework, Cryptography describes the use and controls related to encryption, to help an organization implement, maintain, and improve its information security management.

7 0
3 years ago
uppose you are going on a road trip with friends. Unfortunately, your headlights are broken, so you can only drive in the daytim
tiny-mole [99]

Answer:

Explanation:

Algorithm:

a. In each day, you will have to loop through the hotels that come to the hotel after you stayed last night.

b. If a hotel 'h' is found at more than 'd' distance away from last stayed hotel, then the hotel previous of 'h' is chosen to wait for that night. This is the greedy step, and you stay in this hotel.

c. The process for steps a and b is then repeated until we've reached the last hotel xn.

Running time:

Notice that the worst case occurs if each hotel is at a distance of successive multiples of 'd'. The best move is to estimate the distance to each hotel twice the whole computation in the scenario.

Thus, the total running time that could occur in the worst case is O(2n) = O(n). This is said to be linear time.

6 0
3 years ago
The process of creating a set of instructions that tell a computer how to perform a task is called:
zlopas [31]
It is known as a command
8 0
3 years ago
In order for network monitoring to work properly, you need a PC and a network card running in what mode?
Natasha_Volkova [10]

Answer:

Promiscuous

Explanation:

5 0
3 years ago
What is the purpose of the boot loader during the bootup process
earnstyle [38]
To start up windows and boot the system to make sure no hackers or viruses are on windows so your computer does not get infected with a hacker or virus 

hope this helps 
6 0
2 years ago
Read 2 more answers
Other questions:
  • We never need to use a forward declaration when invoking a public subprogram. true or false?
    15·1 answer
  • I need this ASAP anyone pleas help me i have to do this by tonight
    10·1 answer
  • Building relationships during your career exploration is called
    6·1 answer
  • How Oracle 12c advances the security discussion?
    12·1 answer
  • Which statement is NOT CORRECT?
    11·1 answer
  • The main workspace of a Windows computer is called the______
    5·1 answer
  • You are writing a program using the Java language. Which of the following is a requirement of Java syntax?
    6·1 answer
  • The numeric keys on a keyboard or calculator are referred to as a:
    10·1 answer
  • Privacy, anonymity, and freedom of expression are all interrelated.
    12·1 answer
  • As a technical support rep, michael is responding to a customer's question sent to him via e-mail. what should michael's first t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!