1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
geniusboy [140]
3 years ago
9

PLS HEEELLLP ASAP, DONT JOKE

Computers and Technology
2 answers:
Deffense [45]3 years ago
7 0

Explanation:

Computer viruses are spread through transportable secondary storage.e.g, inserting a hard disk that already has virus into another computer.

Lady_Fox [76]3 years ago
6 0
The answer is C secondary storage
You might be interested in
Wi-Fi is designed for medium-range transfers, up to ____ feet outdoors. Answer 100 300 500 900
Papessa [141]
Wi-Fi is designed for medium range transfers up to 900 feet out doors. ANSWER: 900 feet
6 0
4 years ago
Which intel processor technology interconnects the processor, chipset, and wireless network adapter as a unit, improving laptop
Ira Lisetskai [31]
Apu?
....................
8 0
4 years ago
Give a big-O estimate for the number additions used in this segment of an algorithm.
rjkz [21]
Big-O notation is a way to describe a function that represents the n amount of times a program/function needs to be executed. 

(I'm assuming that := is a typo and you mean just =, by the way) 

In your case, you have two loops, nested within each other, and both loop to n (inclusive, meaning, that you loop for when i or j is equal to n), and both loops iterate by 1 each loop.

This means that both loops will therefore execute an n amount of times. Now, if the loops were NOT nested, our big-O would be O(2n), because 2 loops would run an n amount of times.

HOWEVER, since the j-loop is nested within i-loop, the j-loop executes every time the i-loop <span>ITERATES. 
</span>
As previously mentioned, for every i-loop, there would be an n amount of executions. So if the i-loop is called an n amount of times by the j loop (which executes n times), the big-O notation would be O(n*n), or O(n^2). 

(tl;dr) In basic, it is O(n^2) because the loops are nested, meaning that the i-loop would be called n times, and for each iteration, it would call the j-loop n times, resulting in n*n runs.

A way to verify this is to write and test program the above. I sometimes find it easier to wrap my head around concepts after testing them myself.
3 0
4 years ago
Bobby is investigating how an authorized database user is gaining access to information outside his normal clearance level. Bobb
Sveta_85 [38]

Answer:

Aggregate Function .

Explanation:

The aggregate function returns the single value of the entire column of the database management system. The Aggregate Function is used in the SELECT statement and the GROUP BY clause.  

The sum(),avg(), etc are some examples of Aggregate Function in the database with the help of aggregate function bobby gains the access to information above the usual clearance point. and summarizes the data.

7 0
3 years ago
What's the difference between pseudo code and natural language​
ArbitrLikvidat [17]

Answer: While algorithms are generally written in a natural language or plain English language, pseudocode is written in a format that is similar to the structure of a high-level programming language. Program on the other hand allows us to write a code in a particular programming language.

8 0
3 years ago
Read 2 more answers
Other questions:
  • In the lan protocol architecture the _________ layer is responsible for detecting errors and discarding any frames that are in e
    13·1 answer
  • Samantha has to create a video for her science project on the blossoming of a flower from a bud to one with fully opened petals.
    5·2 answers
  • Betrand Meyer developed the ______ programming language which is not type-safe because it violates the law of contravariance.
    9·1 answer
  • Explain the saying "Dress for the position you want, not the position you have."
    6·2 answers
  • People using commercially available software are usually asked to read and agree to a(n) _____
    10·1 answer
  • A tablet computer is a low-cost, centrally managed computer with no internal or external attached drives for data storage.
    10·1 answer
  • Which logic gate produces an output of 1 only if both its inputs are 0
    12·2 answers
  • Identify the benefit of modeling to communicate a solution.
    10·1 answer
  • All of the following are used to fund private schools except ______
    14·2 answers
  • Simplify 0.2×0.03055 to 3 decimal places​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!