1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pav-90 [236]
3 years ago
13

Please help me with this , I’m stuck and cannot understand this , please help me with this , I’ll appreciate it alot

Computers and Technology
1 answer:
Licemer1 [7]3 years ago
6 0

Answer:

im sorry but i cannot explain it

You might be interested in
What is a data type?
kvasek [131]

Answer:

Data type is an attribute of the data in the computer science. It basically guide the compiler and interpreter about the data utilization in the program. Data type basically define the operation, which can be done on given data.

There are different types of data types are as follow:

Integer data type: This type if data type basically represent the integer type of data value from largest to smallest order.

For example: int p = 10;

Real data type: This type of data type is used to represent the real type of number from largest to smallest range.

For example: float b = 17.6;

7 0
3 years ago
Which method would be the BEST to protect security information and event management (SIEM) log data at rest from tampering by au
AnnyKZ [126]

Answer:

Option B (Deployment of write once read many (WORM) drives) is the appropriate one.

Explanation:

  • SIEM application goods/services consolidate safety information management (SIM) with security event management (SEM) throughout the area of device protection. We include an overview including its known vulnerabilities created by users and network equipment in actual environments.
  • No quantity of administrative intervention will alter the substance on something like a WORM disc, even by physical disc disruption or failure. That would be the better-suggested choice.
7 0
3 years ago
Suppose you are choosing between the following three algorithms:
Pavel [41]

Answer:

Algorithm C is chosen

Explanation:

<u>For Algorithm A </u>

T(n) = 5 * T ( n/2 ) + 0(n)

where : a = 5 , b = 2 , ∝ = 1

attached below is the remaining part of the solution

6 0
3 years ago
What is a what if analysis in Excel example?
Sergio039 [100]

Answer:

What-If Analysis in Excel allows you to try out different values (scenarios) for formulas. The following example helps you master what-if analysis quickly and easily.

Assume you own a book store and have 100 books in storage. You sell a certain % for the highest price of $50 and a certain % for the lower price of $20.

(i really hope this is what u needed)

4 0
3 years ago
While working on a presentation, Jack lost all the data because he switched off his computer unknowingly. On which of these comp
Lelechka [254]

Random Access memory(RAM) stores data temporary until the computer is switched off

3 0
3 years ago
Read 2 more answers
Other questions:
  • The operating system is not directly involved in one of these tasks.Immersive Reader
    12·1 answer
  • Which method is the best way to keep from running late on the day of a test
    10·1 answer
  • Sherry’s science teacher requires the use of an open access database . Which of the following meets the requirements
    6·1 answer
  • What does server manager utility do
    7·1 answer
  • The best way to access the Windows Help and Support Center is _____.
    10·1 answer
  • What are the programs required to work in computer
    7·1 answer
  • Task 1: Alex has created the following code using Scratch and expected it to move backwards and forwards across the screen. Howe
    13·1 answer
  • Which example best demonstrates an impact of computers on health care?
    14·2 answers
  • How does the issue of cybersecurity relate to the internet of things?.
    5·1 answer
  • ‘’AZ’’ is an example of a __.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!