1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
3 years ago
5

Proper humidity and temperature for information systems equipment is an example of what type of security?

Computers and Technology
1 answer:
lidiya [134]3 years ago
3 0

Answer:

Administrative security

You might be interested in
Give an O(log m + log n)-time algorithm that takes two sorted lists of sizes m and n, respectively, as input and returns the ith
olga2289 [7]

Binary search is used similarly. K'th element is found in more productive way.

<u>Explanation:</u>

arr1 and arr2 are the middle elements which are compared, let us compute as mid1 and mid2. Let us predict arr1 [mid1] k, the elements are not needed after mid2 elements.  arr2 are set as last element for arr2 [mid2].  New sub problems are defined. When one array is half the size.

C++ code for the algorithm.

#include <iostream>

using namespace std;    

int kth(int *arr1, int *arr2, int *end1, int *end2, int k)

{

if (arr1 == end1)

return arr2[k];

if (arr2 == end2)

return arr1[k];

int mid1 = (end1 - arr1) / 2;

int mid2 = (end2 - arr2) / 2;

if (mid1 + mid2 < k)

{

if (arr1[mid1] > arr2[mid2])

return kth(arr1, arr2 + mid2 + 1, end1, end2,

k - mid2 - 1);

else

return kth(arr1 + mid1 + 1, arr2, end1, end2,

k - mid1 - 1);

}

else

{

if (arr1[mid1] > arr2[mid2])

return kth(arr1, arr2, arr1 + mid1, end2, k);

else

return kth(arr1, arr2, end1, arr2 + mid2, k);

}    

int main()

{

int arr1[5] = {2, 3, 6, 7, 9};

int arr2[4] = {1, 4, 8, 10};    

int k = 5;

cout << kth(arr1, arr2, arr1 + 5, arr2 + 4, k - 1);

return 0;

}

7 0
3 years ago
True or False: Changing a bid package's status to "Closed" removed it from the bidder's Planroom and the bidder will no longer b
Readme [11.4K]

Answer:

True

Explanation:

It's actually true because once a bidding page status changes to closed, it means that the timeframe for bidding has stopped, hence, no bidder will be able to bid again.

7 0
3 years ago
Change the file name for index.html to index.php
Damm [24]

The PHP code is given below:

<h3>PHP code</h3>

if(isset($_REQUEST['login_btn'])){

       $email = filter_var(strtolower($_REQUEST['email']),FILTER_SANITIZE_EMAIL); //strtolower changes email to all lower case

       $password = strip_tags($_REQUEST['password']);

The remaining code is in the file attached.

 

Read more about PHP here:

brainly.com/question/27750672

#SPJ1

Download txt
4 0
1 year ago
The application that Scott is writing has a flaw that occurs when two operations are attempted at the same time, resulting in un
Luden [163]

The type of flaw that the application is said to  have is known to be called race condition.

<h3>What is meant by race condition?</h3>

A race condition is known to be a form of unwanted situation that takes place when a device or system tries to carry out two or more operations at the same given time, but due to the nature of the device or system, the operations had to b be done in the right sequence to be carried out correctly.

Therefore, The type of flaw that the application is said to  have is known to be called race condition.

Learn more about race condition from

brainly.com/question/13445523

#SPJ1

3 0
2 years ago
Read 2 more answers
If you weigh 100 pounds, and your 150 pound big sister is sitting 15 feet from the fulcrum of a seesaw, how far from the fulcrum
Dahasolnce [82]

Answer:

22.5

Explanation:

My weight = 100 pounds

Sister's weight = 150

Distance from fulcrum = 15 ft

Distance has an inverse proportion with weight

Distance = k/w

Where k is a constant

K = distance x weight

K = 100 x distance

150 x 15 = 100 distance

2250 = 100 distance

Divide through by 100 to get distance

2250/100 = distance

Distance = 22.5

5 0
3 years ago
Other questions:
  • The term composite would be used to describe an image that was altered by the Crop tool.
    15·1 answer
  • With a _____ network connection, the computers and other devices on the network are physically connected via cabling to the netw
    13·1 answer
  • 4-Translate the following C program to MIPS assembly program (Please explain each instruction in your code by a comment and subm
    6·1 answer
  • You are given 6 training examples for a binary classification problem as follows:
    12·1 answer
  • Alan has introduced a new line of scooters on his website and is using a Google Display Ad campaign to promote them. He selects
    8·1 answer
  • Who has gotten a random file link from someone? What file does it contain?
    8·2 answers
  • Hi I need help with an assignment. We're learning about encryption and decryption in code.org. i need help with three of the tex
    14·1 answer
  • 1. Why do you need to take care of your computer? (Remember: Answer must include 3-5 sentences.)
    13·1 answer
  • Do pc players ever go outside?
    11·2 answers
  • Insertion point shows where the typed text will appear.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!