1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natulia [17]
3 years ago
7

2) What are two reasons we analyze algorithms?

Computers and Technology
2 answers:
Likurg_2 [28]3 years ago
8 0
It’s a making sections about what algorithms to use
dexar [7]3 years ago
5 0

Answer:

Make decisions about what algorithms to use

Explanation:

You might be interested in
Give two reasons why cloud computing could be detrimental to a company.
dimulka [17.4K]

Security/Insider threats.

As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.

Cyber-attacks.

Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.  


3 0
4 years ago
A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an internet connection a
nordsb [41]
It's called an attack
4 0
3 years ago
When connecting to the internet, most internet users connect to a tier 1 network.​?
denis23 [38]
False

Tier 1 ISPs exchanges traffic with other tier 1 internet traffic providers and are the backbone of the internet. They do not provide traffic to end users but provide internet to other ISPs. Tier 3 is the last mile provider who delivers internet access to homes and businesses.



8 0
3 years ago
What is the relationship between optical drives and WORMs?
Effectus [21]

Answer:

When data is written to a WORM drive, physical marks are made on the media surface by a low-powered laser and since these marks are permanent, they cannot be erased. Rewritable, or erasable, optical disk drives followed, providing the same high capacities as those provided by WORM or CD-ROM devices.

Explanation:

Good luck

6 0
3 years ago
I NEED THIS ASAP!!
koban [17]

Answer:

Explanation:if a open world game / rpg had humanoids that had lore behind them then the player will feel guilt about killing them from allah

4 0
3 years ago
Read 2 more answers
Other questions:
  • Elise has just edited two photos of her cat and three different photos of her dog. She needs to save all five of these photos in
    5·2 answers
  • On other questions, how do I write my own question, without commenting on others questions? It is only allowed two, I think, the
    13·1 answer
  • From the standpoint of the governing bodies of .com, why is it important that owners of individual domains maintain authoritativ
    5·1 answer
  • Timeliness is an important goal of any access control monitoring system.<br> A. True<br> B. False
    9·1 answer
  • What was the effect of the norman conquest on the language of britain?
    11·1 answer
  • Read the scenario below, and then answer the question.
    13·1 answer
  • What number system do people in America use?
    10·2 answers
  • 45 points pls help
    14·2 answers
  • A multinational organization that offers web-based services has datacenters that are located only in the United State; however,
    6·1 answer
  • The development of online capabilities created the ________, an information- and communication-based electronic exchange environ
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!