1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alinara [238K]
3 years ago
15

Give 2 examples of DigiTools

Computers and Technology
1 answer:
Vera_Pavlovna [14]3 years ago
7 0

Explanation:

Desktop tools

Handheld device e.g. cell phone

You might be interested in
Write a loop that reads positive integers from standard input and that terminates when it reads an integer that is not positive.
zysi [14]
Procedure SumEvenOdd(stdin: array [0..100] of integer)
var
   i, sum_even, sum_odd: integer;

begin
   for i := 0 to 100 do begin
       if stdin[i] < 0 then
           break;
       if stdin[i] mod 2 = 0 then //even number
          sum_even := sum_even +  stdin[i]
       else 
          sum_odd := sum_odd +  stdin[i]; 

       ShowMessage('sum of even is ' + IntToStr(sum_even) + ' ' + 'sum of odd                                  is' + IntToStr(sum_odd) ) ;
   end; 

end
5 0
4 years ago
an attack has changed the value of a variable used when copying files from one cloud server to a local drive. what is the most l
BaLLatris [955]

Based in the provided information, The attacker utilized integer overflow attack which could bring alteration to the state of the local drive's memory.

<h3>What is an attack in computer terms?</h3>

An attack can be regarded as violation of one's data or information on the computer system.

Since, the attacker, changed the value of a variable used when copying files from one cloud server to a local drive, his motive was alteration to the state of the local drive's memory.

Learn more about attack on drive at;

brainly.com/question/11352260

5 0
3 years ago
Suppose that you sort a large array of integers by using a merge sort. Next you use a binary search to determine whether a given
klio [65]

Answer:

See explaination

Explanation:

Merge sort working-

1.type of recursive sorting algorithm.

2.divides given array into halves.

3. Sort each halves. Merge this halves to give a sorted array.

4. Recursive call continues till array is divided and each piece has only one element.

5. Merge this small pieces to get a sorted array.

Binary search-

1. It is a search algorithm.

2. Requires a sorted array to work on.

3.Works repetively dividing a half portion of list that could contain item until it has narrowed down the possible location to just one.

Comparing Merge sort and Binary Search using Big O notation-

Merge Sort - O(n*log(n)) in all scenario whether best, average or worst case.

Binary Search- O(log(n)) in average and worst case. O(1) in best case.

So seeing the above comparison Binary search is faster.

Comparing Binary search and displaying the integers-

Binary Search- O(log(n)) in average and worst case. O(1) in best case.

Displaying the integer-O(1) if already initialized, O(n) in case of loop or function.

So seeing above one can conclude that binary search is fast. But in best case both works in a similar manner.

6 0
3 years ago
​passwords used as encryption ________ help to make hijacked data unusable.
DerKrebs [107]
Passwords are used<span> for authentication and </span>encryption. Password entropy is a measurement of how unpredictable a password is.
Passwords used as encryption keys help to make hijacked data unusable. The encryption key is a <span>random string of bits created explicitly for scrambling and unscrambling data.</span>
5 0
3 years ago
Storage system that uses lasers to read data
tatuchka [14]

I believe it is an optical storage system that uses lasers to read data.

5 0
4 years ago
Read 2 more answers
Other questions:
  • Suppose you develop an app and want to generate revenue but do not want to maintain the app. What would be your best choice?
    9·1 answer
  • Describe network in the terms of computer lab
    5·1 answer
  • Please help
    5·2 answers
  • witch option in a presentation program contains the formatting and placeholders for all the items that appear on a slide?
    11·2 answers
  • When a member function is defined outside of the class declaration, the function name must be qualified with theWhen a member fu
    14·1 answer
  • Speculate on how students 25 years from now will answer, "What computing innovation has had a significant impact on your life?"
    11·1 answer
  • What is one way a senior employee can mentor a new employee? Give orders about what to do and what not to do Gossip about which
    10·1 answer
  • Which image-editing tool can be used to help remove spots and other marks from an image?
    13·1 answer
  • Kevin is a DJ and has a passion for creating and modifying audio tracks. Which application software facilitates him in his passi
    6·1 answer
  • Which protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!