1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mandarinka [93]
3 years ago
11

Cyber security class i need help​

Computers and Technology
1 answer:
makkiz [27]3 years ago
5 0

Answer:

Explanation:

yooooo it b

You might be interested in
4) Which is a more efficient way to determine the optimal number of multiplications in a matrix-chain multiplication problem: en
Assoli18 [71]

Answer:

Running RECURSIVE-MATRIX-CHAIN is asymptotically more efficient than enumerating all the ways of parenthesizing the product and computing the number of multiplications of each.

the running time complexity of enumerating all the ways of parenthesizing the product is n*P(n) while in case of RECURSIVE-MATRIX-CHAIN, all the internal nodes are run on all the internal nodes of the tree and it will also create overhead.

Explanation:

3 0
3 years ago
output device is any peripheral to provide data and control signal to ab information processing system​
nirvana33 [79]

Answer:

Its false ita not "output" its "input"

7 0
3 years ago
As the team leader, John ensures that all his teammates are clear in the team goals they need to achieve. He demonstrates the qu
zimovet [89]

Delegation ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

7 0
3 years ago
Read 2 more answers
During which part of geologic time were dinosaurs most common?
ANTONII [103]
The answer is C. Jurassic.
6 0
3 years ago
Read 2 more answers
Which of these are the two main components of a CPU?
Mrrafil [7]

Answer:

Control unit and Arthemitic logic unit

plz mark me as brainlist

7 0
3 years ago
Read 2 more answers
Other questions:
  • If parties in a contract are not _______, the contract can be canceled.
    7·1 answer
  • Legal counsel has notified the information security manager of a legal matter that will require the preservation of electronic r
    8·1 answer
  • Another important mode, XTS-AES, has been standardized by the __________ Security in Storage Working Group. a. IEEE b. ITIL c. N
    9·2 answers
  • Consider a class called Rocket that has a private instance variable called Engine. You are writing a "getter" for the Engine. Us
    7·1 answer
  • What layer uses the UDP protocol
    6·1 answer
  • Marco is ready to create his first slide. He wants to put the title of the
    11·1 answer
  • What vi command do you use to insert the a file named "file2.txt" to the end of your current file?
    12·1 answer
  • Which tool is best used to test an electrical current for a power source?
    8·1 answer
  • . Suppose that name is a variable of type string. Write the input statement to read and store the input Brenda Clinton in name
    5·1 answer
  • Which among the following if absent, a computer is not complete.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!