Answer:
By Using the Greedy- Activity- Selection algorithm
Explanation:
The Greedy- Activity- Selection algorithm in this case involves
First finding a maximum size set S1, of compatible activities from S for the first lecture hall.
Then using it again to find a maximum size set S2 of compatible activities from S - S1 for the second hall.
This is repeated till all the activities are assigned.
It requires θ(n2) time in its worse .
Answer: as a whale attack
Explanation:
A whale attack is simply refered to as an attack that is utilized by cybercriminals and in this case, a senior player such as the CEO is targeted in the company and the aim is to steal sensitive information from them or steal money or gain access to their computer for fraudulent purposes.
Based on the explanation above, the attack called into is a whale attack.
An example of two potential uses of this command is in the area or aspect of:
- The troubleshoot of networking problems.
- In configuration
<h3>What protocol does the netstat command use?</h3>
It is known to use the Internet Protocol (TCP/IP) and it is one that is used without parameters, this command is said to often show active TCP connections.
<h3>What is netstat used for?</h3>
The network statistics ( netstat ) command is known to be a kind of a networking tool that is often used for troubleshooting and configuration, and this is one that can be used as a tool for monitoring for connections over the network.
Hence, it is used in incoming and outgoing connections, routing tables, port listening, and others. Therefore, An example of two potential uses of this command is in the area or aspect of:
- The troubleshoot of networking problems.
- In configuration
Learn more about troubleshoot from
brainly.com/question/9572941
#SPJ1
Answer:
I think its 4 I'm not so sure though