1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
3 years ago
11

PLEASE ILL MARK BRAINLIEST

Computers and Technology
1 answer:
Minchanka [31]3 years ago
5 0

Answer:

it is a capsid

You might be interested in
After you have figured out your storyline, what should be the next thing to
seraphim [82]
Answer: 2

A storyline figured out means you should already know the plot, setting, conflict, theme and characters (character development)
7 0
3 years ago
Read 2 more answers
What type of micro sd card is needed for this type of MP3 player? I tried searching it up and a bunch came up. I don’t know whic
zaharov [31]
A regular micro sd, they offer different amounts of storage
8 0
3 years ago
. Consider the following brute-force algorithm for evaluating a polynomial. ALGORITHM Brute Force Polynomial Evaluation(P[0..n],
podryga [215]

Answer:

The answer of the the following question are 0(n^2)

The total number of multiplication is 2

And the total number of addition is 1

Explanation:

Let the size of the input is the degree of the polynomial = "n"

Than the number of the multiplications depends on "n"

Let the number of multiplication = M(n)

Let the number of addition = A(n)

1): Solution-

M(n) = n∑_{i=0}          i∑_{j=1}          2

= 2     n∑_{i=0}           i∑_{j=1}  

= 2      n∑_{i=0}      i-1+1

= 2      n∑_{i=0}     i

= 2  *  n*(n+1)/2    =   n*(n+1)

= n^2 + n ∈ 0(n^2)

2): Solution for addition-

A(n) = n∑_{i=0}          i∑_{j=1}          1

= by solving this from the same way it leads to

= n^2 + n   and n^2 + n ∈ 0(n^2)

7 0
3 years ago
which one of the following would not normally be found in an organization's information security policy?
kotegsom [21]

Requirement to use AES-256 encryption would not normally be found in an organization's information security policy.

When it comes to information security, organizations have a variety of different policies and requirements that they adhere to. One of those requirements is the use of AES-256 encryption.

However, not every organization has AES-256 encryption as a requirement in their information security policy. In fact, many organizations don't even know what AES-256 encryption is.

Why is AES-256 encryption relevant?

Well, AES-256 encryption is a strong form of encryption that is used to protect data. It is often used by governments and organizations to protect sensitive data.

AES-256 encryption is a requirement for many organizations because it provides a high level of security for data. Without AES-256 encryption, data could be compromised.

Learn more about information security policy here:

brainly.com/question/14292882

#SPJ4

4 0
2 years ago
How do i delete cookies on a chromebook?
Sphinxa [80]

Answer:

Just go into the browser then go to the searchbar go to any website then click the lock icon in the searchbar then click cookies then go from there

Also you can look this simple info up on g0ogle

6 0
3 years ago
Other questions:
  • When reading data across the network (i.e. from a URL) in Python 3, what string method must be used to convert it to the interna
    9·1 answer
  • write a c++program that allows the user to enter the last names of fivecandidates in a local election and the number of votes re
    15·1 answer
  • Daniel has a list of numbers that are not in any order. He wants to find the order of the numbers with the help of a spreadsheet
    10·2 answers
  • The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software pr
    9·2 answers
  • As the demand for goods and services decreases, job growth.
    14·2 answers
  • Which button should be utilized if a user is unsure whether or not they are the right person to reply to an email?
    6·2 answers
  • PLEASE HELP
    7·2 answers
  • Question:
    14·1 answer
  • Which directory stores the cron configuration file?.
    8·1 answer
  • What is containment and why is it part of the planning process
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!