1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
3 years ago
14

Consider a network that is a rooted tree, with the root as its source, the leaves as its sinks, and all the edges directed along

the paths from the root to the leaves. Design an efficient algorithm for finding a maximum flow in such a network. What is the time efficiency of your algorithm
Computers and Technology
1 answer:
ella [17]3 years ago
5 0

Answer:

please mark me brainlist

Explanation:

You might be interested in
Can some please help me learn how to make a program via Binary Code?
padilas [110]
Look up binary code dictionary it will help you learn codes in letter of binary
8 0
4 years ago
Program C++ I need help!
nikitadnepr [17]

Answer:#include <iostream>

using namespace std;

int main()

{

   int factorial = 1;

   for (int i = 5; i > 0; i--) {

       factorial = factorial * i;

   }

   cout<<factorial;

   return 0;

}

Explanation:

3 0
3 years ago
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a s
Allisa [31]

Answer:

distributed denial of service

Explanation:

5 0
3 years ago
Read 2 more answers
Write a program that asks for the number of calories and fat grams in a food. The program should display the percentage of calor
Zigmanuir [339]

Answer:

 The solution code is written in Python 3:

  1. calories = int(input("Enter number of calories: "))
  2. fats = int(input("Enter number of fat in grams: "))
  3. if(calories > 0 and fats > 0):
  4.    cf = fats * 9
  5.    if(cf < calories):
  6.        percent = cf / calories  
  7.        if(percent < 0.3):
  8.            print("Food is low in fat")
  9.    else:
  10.        print("Error input. Calories from fat cannot more than total calories")
  11. else:
  12.    print("Error input. Calories and fats must be more than 0")

Explanation:

Firstly, use input function to ask user to enter total number of calories and fat in grams (Line 1-2)

Next we do the first input validation to check if the calories and fats are more than 0 (Line 4). If so apply formula to calculate calories from fats. If not, print error input message (Line 5, 13)

Then we proceed to next input validation to check if calories from fact more than total calories. If so, proceed to calculate percentage of calories from fats and if it is lower than 30%, display the appropriate message (Line 6 - 9). If fail the second input validation, the program will display another error input message again (Line 11)

7 0
4 years ago
Other questions:
  • What is a project manager?
    6·2 answers
  • Which other capabilities do many wireless access points have? Choose two answers.
    9·1 answer
  • What do you do to add a line or circle to your presentation?
    7·2 answers
  • PHP is based on C rather than ______.
    5·1 answer
  • Processing information involves ____.a. Performing arithmetic or logical operations on binary data accepting information from th
    15·1 answer
  • Secure shell (SSH) operates over which port by default
    9·1 answer
  • Assume that the client wants to retrieve the www.cnn home page but has no information about the www.cnn web server IP address. D
    11·1 answer
  • What is the difference between
    14·1 answer
  • "You have created a Word document named apple.docx using Microsoft Word. What type of a file is apple.docx ? Select all that app
    14·1 answer
  • missy just hired a software development team to create an educational simulation app for a high school course. she has specific
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!