1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
3 years ago
8

Which would be the best and worst answer choices?

Computers and Technology
1 answer:
jeyben [28]3 years ago
4 0

Answer:

option 3

Explanation:

You might be interested in
what must you consider when determining the efficiency of an algorithm? select two choices. group of answer choices the amount o
ozzi

If an algorithm's resource consumption, often referred to as computational cost, is at or below a certain threshold, it is said to be efficient. Generally speaking, "acceptable" indicates that it will operate on a machine that is available in a fair amount of time or space, usually based on the size of the input.

<h3>Explain about the efficiency of an algorithm?</h3>

Growth requires an understanding of an algorithm's effectiveness. Programmers write code with the future in mind, and efficiency is essential to achieve this. Reducing the number of iterations required to finish your task in relation to the size of the dataset is the goal of efficient algorithm development.

The use of asymptotic analysis can frequently help to solve these issues. As the size of the input increases, asymptotic analysis quantifies an algorithm's effectiveness or the program that implements it.

To express how time-consuming a function is, we use a method called "Big O notation." We use the Big O notation, a language, to describe how time-consuming an algorithm is. It's how we assess the value of several approaches to an issue, and U supports our decision-making.

To learn more about efficiency of an algorithm refer to:

brainly.com/question/13801939

#SPJ4

4 0
1 year ago
What is the binding time for the following in C/C++ program. Explain. a. The location of memory of a local variable in a functio
Evgen [1.6K]

Answer:

Explained

Explanation:

Binding is the association of an object with its attributes, operations, or name  there are many different types of bindings and bindings can occur at different times .

for example:

1)language definition time binding: for example-binding * to multiplication

2)language implementation time binding: int size and operations

3)compile time binding: binding type to a variable

for instance in int x; x will be treated as an int from here forward

4)link time binding: binding function name to a specific function definition

5)load time binding: binding variable to memory location

6)run time binding: binding variable to memory location or bind a polymorphic variable to specific class type .

 binding time for the

a)6  run time binding

b)1  language definition time binding

c)2  language implementation time binding

d)5  load time binding

e)4  link time binding

f)3  compile time binding

g)3  compile time binding:

h)6 run time binding

6 0
3 years ago
Which term refers to the capability of a switch to copy data from any or all physical ports on a switch to a single physical por
pantera1 [17]

Answer:

The correct answer to the following question will be "Port mirroring".

Explanation:

A network traffic analysis tool, recognized as the Port Mirroring.

  • Also known as the Switch port analyzer.
  • The switch transfers a replica among all networking transmissions viewed on one port (or even a whole VLAN) to the next port, wherein the packet could be evaluated, through port mirroring disabled.

Therefore, Port mirroring is the right answer.

3 0
3 years ago
What specific record type is found in every zone and contains information that identifies the server primarily responsible for t
ValentinkaMS [17]

The SOA is the specific record type found in every zone and contains information that identifies the sever primarily responsible for the zone as well as some operational properties for the zone.

Explanation:

The Start of Authority Records (SOA) has the following information they are

Serial Number: This number is used to find when zonal information should be replicated.

Responsible person: The Email address of a person is responsible for managing the zone.

Refresh Interval: It specifies how often a secondary DNS server tries to renew its zone information.

Retry Interval: It specifies the amount of time a secondary server waits before retrying the zone information has failed.

Expires After: IT specifies the amount of time before a secondary server considers its zone data if it can't contact with the primary server.

Minimum TTL: It specifies the default TTL value for a zone data when a TTL is not supplied.

4 0
3 years ago
The relationship between social media and the Internet is complex. Individual Internet behavior involves a myriad of factors tha
Artemon [7]

Answer:

Explanation:

The internet could be regarded has a marketplace or platform which gives individuals, businesses the opportunity to interact, relate, access opportunities, learn in an easy manner with the help of a data connection. The internet has redefined the process and concept of acesing information and interaction with the ease and coverage it brings. The Social media is could be seen a part of the internet platform which allows people to relate and interact, make friends, promote brands and so on. The internet and social media platforms however, in spite of its huge benefits comes with its inherent risk. Including the surge in cyber crime, immorality and information theft to mention a few. Common scenarios whereby banking details are being stolen from databases resulting in wholesale illegal transfer of funds. Issues of blackmail and violent defamation by groups of cohorts has also been a con in the advent of internet and social media, including growing trends of fake news which usually escalate tension, in which the recent unrest in my vicinity benefitted negatively from.

7 0
3 years ago
Other questions:
  • Which of the following describes a hash algorithms ability to avoid the same output from two guessed inputs?A. Collision avoidan
    12·1 answer
  • A file must be ________ before data can be written to or read from it. closed opened buffered initialized none of these
    11·2 answers
  • For security reasons a network administrator needs to ensure that local computers cannot ping each other. which settings can acc
    5·1 answer
  • Advantage and disavantage of malware maintenance
    12·1 answer
  • Technician A says you should measure the parasitic load immediately after the vehicle is turned off. Technician B says you shoul
    10·1 answer
  • Frank develops a questionnaire for his study on Internet dating. One of his questions asks, "How do you feel about Internet dati
    14·2 answers
  • Swiping and pinching are graphical user interface (gui) _____________.
    7·2 answers
  • All states that have altered judicial selection techniques in recent years have adopted some form of:
    10·2 answers
  • A_______ to show the working of an object before it is built or made. A. Prototype b. Test c. Evaluation d. Plan
    10·1 answer
  • The technologist has recorded the red cell morphology as macrocytic. which mcv value would confirm this observation?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!