1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
3 years ago
14

A proposal is also known as a

Computers and Technology
2 answers:
MakcuM [25]3 years ago
8 0
A Proposal is offering something its has to be E because a Work Plan and a Draft plan are both proposal
Darya [45]3 years ago
7 0

Answer:

E

Explanation:

You might be interested in
Suppose you are organizing a party for a large group of your friends. Your friends are pretty opinionated, though, and you don't
Iteru [2.4K]

Answer:

Relative greedy algorithm is not optimal

Explanation:

Proving that Relative’s greedy algorithm is not optimal.

This can be further proved by the following example.

Let us assumethe friends to be invited be Ali, Bill, David, Dennis, Grace, Eemi, and Sam.

The enemy list of each friend is shown below:

• Ali: Bill. David, Dennis

• Bill: Ali, Grace, Eemi, Sam

• David: Ali, Grace, Eemi, Sam

• Dennis: Ali, Grace, Eemi, Sam

• Grace: Bill. David, Dennis. Eemi . Sam

• Eemi: Bill, David, Dennis, Grace, Sam

• Sam: Bill, David, Dennis, Eemi, Grace

From the enemy list, the one with fewer enemies is Ali.

If we invite Ali, then Bill, David, and Dennis cannot be invited.

Next person that can be invited is one from Grace, Eemi, and Sam

If we choose any one of them we cannot add any other person.

For example, if we choose Grace, all other members are enemies of Ali and Grace. So only Ali

and Grace can only be invited.

So we get a list of two members using relative’s greedy algorithm.

This is not the optimal solution.

The optimal solution is a list of 3 members

• Bill, David, and Dennis can be invited to the party.

Hence, it is proved that relative’s greedy algorithm is not optimal, where the maximum number of friends is not invited to the party.

3 0
4 years ago
Convert the following into binary system<br>and vice versa.<br>106​
notka56 [123]
It would be 1101010 in binary
4 0
3 years ago
Read 2 more answers
A trust domain is defined as Select one: a. The agreed upon, trusted third party b. A scenario where one user needs to validate
soldier1979 [14.2K]

Answer:

A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection

Explanation:

Creation of dynamic Trust Domains can be realized through collaborative, secure sharing solutions. The local system is able to trust a domain to authenticate users. If an application or a user is authenticated by a trusted domain, all domains accept the authenticating domain. For instance, if a system trust domain X, it will also trust all domains that domain X trusts. It is a two-way trust relationship and is transitive.

7 0
3 years ago
Read 2 more answers
Thomas drew a rectangle with an area of 6 square cm what is the greatest possible perimeter of this rectangle
lisabon 2012 [21]
The greatest possible perimeter would be 14cm.

3 0
3 years ago
A professor copies one article from a periodical for distribution to the
MariettaO [177]
Yess I think I’m not sure
4 0
4 years ago
Read 2 more answers
Other questions:
  • fill down feature on a formula and you need to keep a cell reference the same which one will allow you to keep the same cell ref
    15·1 answer
  • Jake is preparing his resume. He is applying for the position of iOS application developer at a large software company. He wants
    6·1 answer
  • witch option in a presentation program contains the formatting and placeholders for all the items that appear on a slide?
    11·2 answers
  • Explicit knowledge can be documented and codified, whereas tacit knowledge encompasses insights, judgment, creative processes, a
    9·1 answer
  • Good Morning! Please Help!
    15·1 answer
  • Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to pi
    8·1 answer
  • You and a friend have just started a small business. How could you use the Internet to make your business successful?
    15·2 answers
  • HELP!!!!!!!
    8·1 answer
  • A _______ attack is where the input includes code that is then executed by the attacked system.
    11·1 answer
  • You are given the following design parameters, fill in the table: All memory addresses are 32-bit long; A 64Kbyte (2^16 byte) ca
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!