1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astra-53 [7]
3 years ago
9

Describe, with examples, the way in which a defect in software can cause harm to a person, to the environment, or to a company

Computers and Technology
1 answer:
Arisa [49]3 years ago
4 0

Answer:

Losing jobs. Fire. Destruction of property.

Explanation:

Having a company shut down due to lack of protection and having people testify products unsafe. If software blows up it could cause desturction of property therefore causing the effect of many people losing their jobs.

You might be interested in
Show the dynamic and speculation execution for the following code
djyliett [7]

Answerf9,f10,fll

Explanation:

6 0
3 years ago
Another word for asking a question of your data is to _____ it.
Temka [501]

Answer:

query

Explanation:

7 0
2 years ago
What are the three parts of a camera
son4ous [18]

Answer: Camera lens, Film or sensors, and body.

Explanation: I researched it.

8 0
3 years ago
I need help with this problem please
alina1380 [7]

Answer:

i think its d

8 0
3 years ago
Suppose we compute a depth-first search tree rooted at u and obtain a tree t that includes all nodes of g.
Temka [501]

G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

<h3>What are DFS and BFS?</h3>

An algorithm for navigating or examining tree or graph data structures is called depth-first search. The algorithm moves as far as it can along each branch before turning around, starting at the root node.

The breadth-first search strategy can be used to look for a node in a tree data structure that has a specific property. Before moving on to the nodes at the next depth level, it begins at the root of the tree and investigates every node there.

First, we reveal that G exists a tree when both BFS-tree and DFS-tree are exact.

If G and T are not exact, then there should exist a border e(u, v) in G, that does not belong to T.

In such a case:

- in the DFS tree, one of u or v, should be a prototype of the other.

- in the BFS tree, u and v can differ by only one level.

Since, both DFS-tree and BFS-tree are the very tree T,

it follows that one of u and v should be a prototype of the other and they can discuss by only one party.

This means that the border joining them must be in T.

So, there can not be any limits in G which are not in T.

In the two-part of evidence:

Since G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

The complete question is:

We have a connected graph G = (V, E), and a specific vertex u ∈ V.

Suppose we compute a depth-first search tree rooted at u, and obtain a tree T that includes all nodes of G.

Suppose we then compute a breadth-first search tree rooted at u, and obtain the same tree T.

Prove that G = T. (In other words, if T is both a depth-first search tree and a breadth-first search tree rooted at u, then G cannot contain any edges that do not belong to T.)

To learn more about  DFS and BFS, refer to:

brainly.com/question/13014003

#SPJ4

5 0
2 years ago
Other questions:
  • A derived character that is shared by all members of a clade is called a ______________ of that clade.
    6·1 answer
  • An administrative assistant types a document, saves, and prints. The assistant is using _____.
    14·1 answer
  • What can an attacker use to capture switch traffic that wouldn't normally be sent to the port the sniffer is attached to?
    5·1 answer
  • The northern half of this continent is primarily rainforest and savanna.
    5·1 answer
  • In ____, data can move in both directions at the same time, such as with a telephone.
    11·1 answer
  • The compiler determines the parameterized type in a function template ___________.
    13·1 answer
  • 1) List two hardware methods that can be used to secure data
    11·1 answer
  • You wrote a program to find the factorial of a number. In mathematics, the factorial operation is used for positive integers and
    14·2 answers
  • Select the correct answer from each drop-down menu.
    9·2 answers
  • Poob bn vbyfcfgxfc jghjg jhgh
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!