1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sashaice [31]
3 years ago
9

What is the answer ?? plz help

Computers and Technology
1 answer:
Morgarella [4.7K]3 years ago
5 0
3rd: A force applied to a body to propel it in a desired direction.
You might be interested in
What type of malicious computer programs present themselves as useful computer programs or applications?
erastova [34]

Answer:

The correct answer to the following question will be "Trojan programs".

Explanation:

  • A trojan is a kind of software often identified as legal applications. Internet-thieves and hackers will hire Trojans and they were trying to access to consumer programs. Users are usually fooled into launching and operating Trojans on their devices by a certain form of economic manipulation.
  • It's a kind of malicious software that express themselves as helpful applications and programs.

Therefore, the Trojan program is the right answer.

5 0
3 years ago
Read 2 more answers
Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.
gulaghasi [49]

Answer:

special_num = int(input())

if  special_num == -99 or special_num == 0 or special_num == 44:

   print('Special number')

else:

   print('Not special number')

Explanation:

#get input

special_num = int(input())

#if function to evaluate true or false(aka Boolean)

if  special_num == -99 or special_num == 0 or special_num == 44:

#true evaluation

print('Special number')

#false evaluation

print('Not special number')

8 0
3 years ago
Hi guy how do i make money in app cuz im desperate for 1 right now​
Margarita [4]

Answer:

we need context

Explanation:

7 0
3 years ago
Read 2 more answers
g Q 2 Suppose I need a data structure having the following characteristics: a) must be very space efficient, and b) I have a goo
SIZIF [17.4K]

Explanation:

a.I would choose an advanced data structure like  dispersion tables.

Scatter tables, better known as hash tables, are one of the most frequently used data structures. To get an initial idea, scatter tables make it possible to have a structure that relates a key to a value, such as a dictionary. Internally, the scatter tables are an array. Each of the array positions can contain none, one or more dictionary entries.

It will normally contain a maximum of one, which allows quick access to the elements, avoiding a search in most cases. To know at which position in the array to search or insert a key, a scatter function is used. A scatter function relates each key to an integer value. Two equal keys must have the same dispersion value, also called a hash value, but two different keys can have the same dispersion value, which would cause a collision.

B. If I eliminated the characteristic b, a possible candidate keeping the previous characteristics would be: Balanced binary trees

Balanced binary trees are data structures that store key-data pairs, in an orderly way according to the keys, and allow quick access to the data, given a particular key, and to go through all the elements in order.

They are appropriate for large amounts of information and have less overhead than a scatter table, although the access time is of greater computational complexity.

Although the storage form has a tree structure internally, this is not externalized in the API, making the handling of the data transparent. They are called balanced because, each time they are modified, the branches are rebalanced in such a way that the height of the tree is as low as possible, thus shortening the average time of access to the data.

5 0
3 years ago
if your audience seems confused about a previous slide, in presenter view, whats the best way to jump back to a previous point i
SOVA2 [1]

Answer:

You can go back to that point towards the end of the presentation  or find where it would link later on in the presentation. Then you can ask if there are any questions and if the audience are willing to ask them you can go ahead and explain it.

Explanation:

8 0
3 years ago
Other questions:
  • A DSLR camera is made up of two parts. They are
    13·2 answers
  • 7.12 LAB: Contains the character
    12·2 answers
  • Which protocols are TCP/IP application layer protocols? (choose all that apply)
    5·2 answers
  • Can anyone help me<br> I will make you a brainalist
    13·1 answer
  • To minimize the invasion of privacy, _____.a.organizations should not modify data once it is entered into an information systemb
    14·1 answer
  • The Internet is not a good place to connect with people when looking for a job.
    10·1 answer
  • Computer data that is suitable for text​
    5·1 answer
  • Why is it a good idea to restate in your own words what you heard someone say? It can reduce the chances of a miscommunication.
    11·1 answer
  • 1.   Microsoft Office is ?​
    10·1 answer
  • ___ is a career discipline focusing on helping companies use computer technology effectively.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!