1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnyKZ [126]
3 years ago
13

Free coins who is octane and dont say u dont know because i will do the same to u

Computers and Technology
2 answers:
mart [117]3 years ago
8 0

Answer:

Thank you for the free points.

True [87]3 years ago
6 0

Answer:

thanks for the points

Explanation:

sjsjjsjss

You might be interested in
What Active Directory object enables an administrator to configure password settings for users or groups that are different from
e-lub [12.9K]

Answer:

Password Settings object

Explanation:

Active Directory is made up of different services that are aimed at handling the access and permissions to resources over a network. It was developed by Microsoft and was originally used for centralized domain management but has evolved past that now.

In AD, the data stored are also known as Objects, these objects can be

  1. users or a group that has been given passwords and/or
  2. resources such as computers or printers.
  3. Organizational Units (OUs)

The object responsible for handling the configuration of passwords configuration is the Password Settings object.

Here, all settings relating to password setup, configuration, reset and so on takes place here. The settings can be applied to groups or users which can show the complexity, length, history of the password and so on.

8 0
3 years ago
Applying what formatting option to your excel workbook will make it easier to read when printed out?
blagie [28]
Portrait, as well as 100 percent scale.
8 0
2 years ago
Wat kind o mouse pleese hep meh​
Trava [24]

Answer:

It's is a razer Basilisk

4 0
3 years ago
Privacy laws in other countries are an important concern when performing cloud forensics and investigations. You've been assigne
Klio2033 [76]

Answer:

See the explanation for the answer.

Explanation:

Australian regulations makes extremely difficult for the enterprises to move organizations sensitive data to the cloud which is storing outside the Australian network. These are all managed by the Office of Australian Information Commissioner(OAIC) which provides oversight on the data privacy regulations designed to govern the dissemination of the sensitive information.

One rule they applied under this is The Australian National Privacy Act 1988 which tells how the organizations collect, use, secure, store the information. The National Privacy Principles in the Act tells how organizations should use the people's personal information. The NPP has a rule that An organization must take the responsibility to hold the information without misuse or modified by unauthorized access. They require enterprises to put security service level agreements with the cloud service providers that define audit rights, data location, access rights when there is cross border disclosure of information.

In later time they introduced a new principle called The Privacy Amendment Act 2012. This principle gives set of new rules along with the changes in the many rules in the previous act and also this is having a set of new principles those are called Australian Privacy Principles (APP).

In this there is principle for cross border disclosure of personal information which is APP8. This rule regulates the disclosure or transfer of personal information by an agency or company to a different location outside the country.

Before disclosure the information outside they have to take responsible steps that the company outside the Australia must not breach the APP 's.

3 0
2 years ago
Greedy Algorithm Design
Alik [6]

Answer:

The algorithm is as follows:

1. Start

2. Get the number of items (n)

3. Get the current price of the n items (a1, a2..... an)

4. Get the possible hiked price of the n items (b1, b2..... bn)

5. Calculate the difference between the current and hiked prices for each item i.e. d_i = b_i - a_i

6. Sort the differences in descending order (i.e. from the greatest to the least)

7. Buy items in this order of difference

8. Stop

Explanation:

The algorithm is self-explanatory; however, what it does is that:

It takes a list of the current price of items (say list a)

E.g: a = [100, 150, 160]

Then take a list of the hiked price of the items (say list b)

E.g: b = [110, 180, 165]

Next, it calculates the difference (d) between corresponding prices d_i = b_i - a_i

d = [(110 - 100),(180-150),(165-160)]

d = [10,30,5]

Sort the difference from greatest to lowest (as the difference is sorted, lists a and b are also sorted)

d = [30,10,5]

a = [150, 100, 160]

b = [180, 110, 165]

If there is no hike up to item k, the couple would have saved (i = 1 to d[k-1])

Assume k = 3

The couple would have saved for 2 item

Savings = d[1] + d[2]

Savings = 30 +10

Savings = 40

The saved amount will then be added to the kth item in list a i.e. a[k](in this case k = 3) in order to buy b[k]

Using the assumed value of k

a[k] = a[3]

a[3] = 160

b[3] = 165

Add the saved amount (40) to a[3]

New\ Amount = 40 + 160

New\ Amount = 200

This new amount can then be used to buy b[3] i.e. 165, then they save the change for subsequent items

8 0
3 years ago
Other questions:
  • What block cipher mode of operation involves each ciphertext block being fed back into the encryption process to encrypt the nex
    12·1 answer
  • Select the correct answer. Which character type is usually seen more often in games for young children than for the other age gr
    13·1 answer
  • Which Internet Explorer security zone includes all Internet Web sites that are not specifically assigned to another zone?
    7·1 answer
  • What social impact did the gunpowder have on society?
    12·1 answer
  • 1. What runs horizontally and is identified with numbers?
    12·2 answers
  • What is the work of the cpu as processer
    6·2 answers
  • Three different numbers need to be placed in order from least to greatest. For example, if the numbers are ordered 9, 16, 4, the
    15·1 answer
  • What is the output of the following code:
    10·1 answer
  • Explain how communication facilitate cordination​
    14·1 answer
  • If you want to access your home network from your distant garage, a ________ might help boost the signal.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!