1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andre [41]
3 years ago
7

An online retailer has developed an algorithm to provide personalized recommendations to shoppers. Which form of IPR protects th

e algorithm
from being copled by others?
OA trade secret
OB. patent
OC trademark
OD. copyrights
Computers and Technology
1 answer:
Helen [10]3 years ago
5 0

Answer:

should be B.

Explanation:

If not then Im sorry

You might be interested in
Saving a file as a new filename can be accomplished through the Save As dialog box? True<br> False
aliina [53]
Your answer would be true, (brainliest answer please)
7 0
3 years ago
A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.
Lunna [17]

The answer to this question is a firewall. A Firewall is a network security system that blocks and prevent unauthorized use or access of company’s network. Firewall is also a program that screens and restricts viruses and other users like hackers to reach the network through the internet. 

3 0
3 years ago
Lenovo laptop
igor_vitrenko [27]
Oh i do i do i do .... but could u retake the pic. it is kinda blurry
4 0
3 years ago
Identity any five system unit components and explain the use for each [apart from processor]<br>​
saw5 [17]

Answer:

RAM

ROM

PROCESSOR

MOTHER BOARD

HARD DISK

Explanation:

Random access memory or RAM store data temporary

Read only memory or ROM permanently store data and have a programming needed to start (PCs) or other electronic device

CPU or processor refers to brain of computer

Mother board the main internal hardware component of system unit

Hard disk is electro mechanical data storage

8 0
3 years ago
Improvised Explosive Devices (IED) may be deployed in any shape, form, or size. Some of the types of IEDs are package-type IED,
m_a_m_a [10]

Answer:

Types of IEDs are<u> individual wearing explosive-type IED</u>, package-type IED and vehicle-borne IED.

Explanation:

Improvised Explosive Devices, commonly known as roadside bombs, are a type of explosives that are developed and used for purposes other than military action. IEDs can be deployed in any form, shape or size.

Improvised Explosive Devices can be of the following types:

1. Package-type IED

2. Vehicle-borne IED

3.<u> Individual wearing explosive-type IED</u>

6 0
3 years ago
Other questions:
  • How do you jumpstart a car in the middle of nowhere??? Explain using 2 paragraphs.
    14·2 answers
  • Which best describes rfid technology?
    5·1 answer
  • A text file has been transferred from a Windows system to a Unix system, leaving it with the wrong line termination. This mistak
    15·1 answer
  • Declare a char array named line of size 50, and write a statement that reads in the next line of console input into this array.
    6·1 answer
  • Which statement will properly start the main() function? def main(): def Main def main# def main[]
    14·2 answers
  • Contains the instructions your computer or device needs to run programs and apps
    5·1 answer
  • Which is true about lists and stacks?
    8·1 answer
  • So i'm trying to figure out why this code wont run can anyone help me
    8·1 answer
  • What Is entered into the system as input?
    13·1 answer
  • Join my FNAF fan club discord
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!