<u>Answer:</u>
<em>Sewage treatment Programs
</em>
<u>Explanation:</u>
Sewage treatment programs are the right choice <em>because these are the source to create germs and if we understand how to be clean, most of the disease is avoided.
</em>
<em>Drug regulation:</em> It is nothing but the continuous treatment of prolonged disease where pills needs to be taken regularly to protect patients from death or to avoid disease become more severe.
<em>Physical fitness campaign:</em> This concentrate on to how to keep bod fit through exercise and it does not deal with hygiene.
<em>Nutrition Education:</em> It’s a kind of protection mechanism where in-take of food is really concentrated to fight against germs.
Answer:
B.O(2n)
Explanation:
The time complexity of solving towers of hanoi problem recursively is O(2n) because there are two recursion calls in the solution of tower of hanoi.First recursive call to move n-1 disks to from source to helper then the user moves nth disk from source to destination after that recursion moves n-1 disks from helper to destination using source as helper rod.So each recursive call make two more recursive call this makes the time complexity be O(2n).
Linux distributions would be his best choice is Kali version.
<h3>What the best version of linux for pentest? </h3>
Although Linux is used by only about 2.3% of all desktop computer users, it is still a viable option for certain tasks such as cybersecurity. In fact, there are even certain Linux distributions designed as cybersecurity platforms. Some of these are listed below. This is the most widely used ethical hacking operating system. It is a Debian-based Linux-based operating system designed for penetration testing and digital forensics. It is funded and maintained by Offensive Security Ltd. Kali Linux is the largest and most widely used operating system for hackers. Kali Linux is not only a free, convenient and highly secure Linux operating system, but also includes over 600 information security tools. Hackers often use Kali Linux because it has security analysis, security auditing, and penetration testing.
Learn more about Kali linux: brainly.com/question/28187773
#SPJ4