1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgen [1.6K]
3 years ago
15

Which type of evidence should victims collect to help officials catch cyber bullies?home addressesbirthdayssocial media username

suser passwords
Computers and Technology
1 answer:
skad [1K]3 years ago
3 0
Bjejfjdjdjdjdjdjdjdndjdjdjdjdjdjdjdjdjdjdjdjdjdjdjdjddjjddjjdjdjdjd
You might be interested in
Use Quicksort algorithm to sort the following list of random numbers. Show all steps. Derive the time complexity of Quicksort an
Zigmanuir [339]

Answer:

Quick Sort is a Divide and Conquer algorithm which picks an element as a pivot which divide the array into two halves.

Sorted Array -2 | 0 | 1| 3| 4| 5 | 6| 7 | 8| 9 |10 | 12 |14| now array is sorted

Time Complexity of Quick Sort = = O ( n log n )

asymptotic notation using master theorem = T(n) = aT (n/b) + θ ( n^k log^p n)

Explanation:

Quick Sort is a Divide and Conquer algorithm which picks an element as a pivot which divide the array into two halves. There are many types of Quick Sort as

  •  Pick the first element as pivot
  • pick the last element
  • pick random element
  • pick median element

3 | 4 | -2 | 8 | 10 | 5 | 0 | 7 | 12 | 14 | 9 | 6 | 8 |1 | 5 //5 as a pivot

-2 | 3 | 4| 8| 5| 0| 7 |10 |12| 14 | 9 | 6 | 1| 5| 8 //8 as pivot

-2 | 0 | 1| 3| 4| 5 | 6| 7 | 8| 9 |10 | 12 |14| now array is sorted

here pick a point as initial values first pick 5 as pivot then compare the 5<values if it id true then swap it of it is false move towards next and check the condition. Similarly half array is sorted pick 8 as pivot point then do the same procedure and sort the other half array.

Time Complexity of Quick Sort

T(n) =a

= 2T(n/2) + n

= 2( 2T (n/4) + n/2) + n

= 2² T (n/2²) +n +n

= 2² (2t(n/2³)+n/4 ) +n +n

= 2³T (n/2³) + n +n +n

= 2^k T ( n/ 2^k) + nk

= nT( n/n ) + n log n

= na + n log n

= O ( n log n )

asymptotic notation using master theorem.

T(n) = aT (n/b) + θ ( n^k log^p n)

a = number in the recursion and a >= 1

n/b = size of each sub problem

b > 1, k >= 0 and p is a real number.

6 0
3 years ago
Consider a city of 10 square kilometers. A macro-cellular system design divides the city into square cells of 1 square kilometer
victus00 [196]

Answer:

1,000 users

10,000,000 users

Explanation:

Given the following :

Area of city = 10 square kilometers

Each cell = 1 square per kilometer

Number of users each cell can accommodate = 100

Total number of users that can be accommodated in the system :

(Total number of cells in the system * number of users per cell)

(10 sqkm / 1 sqkm) * 100

10 * 100 = 1,000 users

B) If cell size is reduced to 100 square meters

Converting 100 square meters to square km

100 sq meters = 0.0001 sq kilometers

Number of users each cell can accommodate = 100

Total number of users that can be accommodated in the new system :

(Total number of cells in the system * number of users per cell)

(10 sqkm / 0.0001 sqkm) * 100

100,000 * 100 = 10,000,000 users

6 0
3 years ago
if the president goes for vice president after his 2 term and the present president dies is the old president the president agai
ICE Princess25 [194]

Answer:

Yes it is possible though it hasn’t happened it is possible the most a person can be president is 10 years.

Explanation:

i believe this is the right answer

3 0
3 years ago
Read 2 more answers
In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers'
myrzilka [38]

Answer: True

Explanation: Domain name system(DNS) is the kind of attack that exploits the functioning of the DNS .This process is also known as the DNS spoofing .The corrupted data is invoked in the cache database and thus creates spoof.

It creates diversion of the traffic from the actual servers to the fake servers and entering the exploited data in the cache database.Thus, the given statement is true.

4 0
3 years ago
The part of the computer that provides access to the internet is the
Anuta_ua [19.1K]
The modem is what provides a computer access to the internet, but it doesn't necessarily have to be hard wired to your device. I'd say either A or D, but D seems more plausible.
5 0
3 years ago
Other questions:
  • Given ProblemSolution class. Use a pointer to object of "ProblemSolution" class to invoke the "CalculateSum" and "Print" methods
    15·1 answer
  • To move a file or folder in Microsoft Windows you can click and hold down the left mouse button while moving your mouse pointer
    5·1 answer
  • All computers can support multiple internal hard drives. <br><br> a. True <br><br> b. False
    13·1 answer
  • Please help ASAP, will mark brainliest!
    10·1 answer
  • If you are inserting an address block with the Address Block dialog box and the fields do not connect automatically, what can yo
    6·2 answers
  • The autocorrect feature can automatically capitalize the first letter in the names of days. true false
    15·1 answer
  • a rule that states each foreign key value must match a primary key value in the other relation is called the
    5·1 answer
  • Gina has created a banking database. she wants to index the account opened date field. why would she do that?
    7·1 answer
  • David is preparing a report to show the percentage increase in population in the United States in the last five years. Which fea
    12·1 answer
  • Verizon's implementation of a web-based digital dashboard to provide managers with real-time information such as customer compla
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!