1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maria [59]
3 years ago
15

Drag each label to the correct location on the image

Computers and Technology
2 answers:
tamaranim1 [39]3 years ago
7 0

Answer:

huhhhhhhhhhhhhhhhhhhhh

USPshnik [31]3 years ago
3 0

Answer:

Explanation:

because i took the test

You might be interested in
Suppose the inventory is unordered (!) and a sequential search is done to locate a specific artifact. Given that the search is e
lana [24]

Answer:

The computer can do 12000 searches per second. Suppose there are 60000 inventory items. And we need to search one item from it in a sequential manner. The computer can do 12000 searches in one second. Hence it can search in a list of 60000 inventory in 5 seconds, as 12000 x 5 =60000 searches, in the worst case. And if the item is below 12000 on the list, it will take less than 1 second(1/12000 sec in best case), and so on.

And if we assume that the list is sorted, and perform a binary search. then in the worst case, the number of searches required in the worst case will be 60000/2= 30000. And the time required will be 30000/12000= 5/2=2.5 seconds, and (1/24000) seconds in the best case. Its 1/24000 as its binary search.

Explanation:

Please check the answer section.

6 0
3 years ago
How does Wireshark differ from NetWitness Investigator?
nikdorinn [45]

Answer is given below

Explanation:

  • Wireshark differ from NetWitness Investigator because
  • Windshark shows a detailed view of individual packets.
  • WireShark captures live traffic and displays the results at the packet level.
  • Netwitness shows a high-level view and can be compared to the new packet capture
  • NetWitiness Investigator provides a comprehensive overview of previously tracked traffic that can be used to view anomalies, compliance and attacks.
8 0
3 years ago
What does this result prove about the computer’s network connectivity?
Anna007 [38]
It can prove or disprove the fact that your computer is connected it the internet by in turn whether you can do almost anything
7 0
3 years ago
Answer 7(a)<br> please need help
Yuki888 [10]

Answer: its like the brain. when you plug in your keyboard it acts like a brain. when you want to do something, your brain sends a message to the that part of your body.

Explanation:

6 0
3 years ago
Write a program that reads the student information from a tab separated values (tsv) file. The program then creates a text file
kvasek [131]
#include
#include
#include
#include
#include
#include


using namespace std;

// Class student required to store the data
class Student{
public:
string lname;
string fname;
int marks[3];
char grade;

// Function which generates the grade for student
void calculate_grade(){
double sum = 0;
for(int i=0;i<3;i++){
sum+= marks[i];
}
double average = sum/3;
if(average>=90 && average<100)
this->grade = 'A';
else if(average>=80)
this->grade = 'B';
else if(average>=70)
this->grade = 'C';
else if(average>=60)
this->grade= 'D';
else this->grade = 'F';
}
};

// This function reads the file , and creates a vector of Students data
vector read_file(string fileName){

// Opening the file
fstream fin;
fin.open(fileName);


// Temp variables
vector list;
vector row ;
string line, word, temp;

// Read the data into vector
while(getline(fin,line)){
row.clear();
stringstream s(line);

while(getline(s,word,'\t')){

row.push_back(word);

}
Student st;
st.fname = row[0];
st.lname = row[1];
st.marks[0] = stoi(row[2]);
st.marks[1] = stoi(row[3]);
st.marks[2] = stoi(row[4]);
st.calculate_grade();
list.push_back(st);
}
fin.close();
return list;
}

// This function takes filname to be output as input, and list of student
void writeFile(string filename, vector list){

// Opening the new file
ofstream fin(filename);
for(int i=0;i string line = list[i].fname+"\t"+list[i].lname+"\t"+to_string(list[i].marks[0])+"\t"
+to_string(list[i].marks[1])+"\t"+to_string(list[i].marks[2])+"\t"+list[i].grade+"\n";
fin<
}


// Find the stats required
double average1 =0,average2 =0 ,average3 = 0;
for(int i=0;i average1+=list[i].marks[0];
average2+=list[i].marks[1];
average3+=list[i].marks[2];
}
average1/=list.size();
average2/=list.size();
average3/=list.size();

// Writting the stats
fin<<"\n"<<"Average: "<<"mid_term1 "<
// Closing the file
fin.close();
}
int main(){

// Taking the input
cout<<"Enter the filename: ";
string filename;
cin>>filename;
vector list;

// Reading and Writting to the file
list = read_file(filename);
writeFile("report.txt",list);


}
3 0
3 years ago
Other questions:
  • Computers have become easier to use and more powerful over time.
    12·2 answers
  • The document theme does not determine the appearance of the style
    6·1 answer
  • Rebecca completed work on a computer and is verifying the functionality of the system when she finds a new problem. This problem
    15·1 answer
  • Which arrangement shows the strongest gravitational effects of the sun and moon on the earth's tides?
    10·1 answer
  • Simone frequently downloads mobile apps from Amazon Appstore. What operating system does she have on her smartphone?
    6·1 answer
  • The statistically multiplexed wan technology that is specifically designed to carry multiple kinds of traffic (data and voice is
    8·1 answer
  • What is the safest way to pay online​
    13·2 answers
  • Which of these is true of blackhat and whitehat hackers?
    5·2 answers
  • How to create drop down list in excel with multiple selections.
    13·2 answers
  • An optical drive randomly becomes unavailable, and after replacing the drive, the technician now suspects that the drive may not
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!