1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr-060686 [28]
3 years ago
9

How large must a group of people be in order to guarantee that there are at least two people in the group whose birthdays fall i

n the same month?
a) 2 people
b) 3 people
c) 12 people
d) 13 people
Computers and Technology
1 answer:
antoniya [11.8K]3 years ago
3 0

Answer:

d) 13 people

Explanation:

According to the Pigeonhole Principle, it states that given that several X commodities are placed into Y containers, and the number of X commodities is greater than the number of Y containers, then there will be a minimum of one Y container having more than one X commodities.

Hence, in this case, since the month is 12 in numbers, then to have at least two people in the group whose birthdays fall in the same month, the group must be at least 13 people.

You might be interested in
"What technology will examine the current state of a network device before allowing it can to connect to the network and force a
slava [35]

Answer:

a network access control

3 0
3 years ago
In testing you find that one of the tables in your database has multiple versions of one of the columns, and updating the inform
emmainna [20.7K]

Answer:

C. i think

Explanation:

C. is my answer........

5 0
3 years ago
Generally considered to be the most important information security policies, what item below defines the actions a user may perf
tamaranim1 [39]

Answer:

A. Acceptable use policies

Explanation:

These specific actions that the user may perform are all described in the acceptable use policy. The company usually requires that the user read and sign this policy before being granted a network ID into the system itself. By signing this agreement the individual user agrees to perform ONLY the actions listed in the agreement and nothing else and are restricted from unauthorized areas.

3 0
4 years ago
The ____ command can be used to view the contents of a record when it is anticipated that the record will need to be modified. I
GREYUIT [131]

Answer:

The correct answer is B)

Explanation:

The commit command allows us to:

• Consolidate, confirm

• committing refers to the idea of confirming a set of provisional changes permanently.

• A popular use is at the end of a database transaction.

•

The LOCK TABLE command should be used:

• when a lock of the mode specified in the table can be acquired.

• The command will wait for everything you need to get the lock,

• In case you cannot acquire the lock immediately, the NOWAIT option is specified so that the command cancels the transaction.

6 0
3 years ago
python There is a reference variable office_a_c of type AirConditioner. Create a new object of type AirConditioner using the off
Kay [80]

Answer:

  1. class AirConditioner:
  2.  def __init__(self, a_c=False):
  3.    self.office_a_c = a_c  
  4. ac = AirConditioner()
  5. ac.office_a_c = True

Explanation:

Firstly, create a class and name it as AirConditioner (Line 1).

Next in the class constructor, create the reference variable office_a_c (Line 3). Please note the reference variable shall be preceded with a self keyword. Besides, the reference variable is set to False by default.

Create an AirConditioner object (Line 6) and then use the dot syntax (.) to set the object reference variable office_a_c to True.

8 0
3 years ago
Other questions:
  • You can encrypt individual files, but microsoft recommends encrypting at what level?
    9·1 answer
  • The term ________ refers to the use of a single unifying device that handles media, internet, entertainment, and telephone needs
    13·1 answer
  • When you boot up a computer and hear a single beep, but the screen is blank, what can you assume is the source of the problem?
    11·2 answers
  • The IT person most involved with system development is the _________
    14·1 answer
  • What is VoIP?
    5·1 answer
  • Which is better analog music or digital music
    15·2 answers
  • Methods that require you to use an object to call them are called ____ methods.1. accessor
    7·1 answer
  • The intellectual property right that gives a creator control of his or her written work is known as what?
    9·1 answer
  • Write a program that uses nested loop or for statements to display Pattern A below, followed by an empty line and then another s
    5·1 answer
  • KAPWING Video Editing Software allows you to use existing You Tube Videos in your design.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!