1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
3 years ago
8

What kind of company would hire an Information Support and Service employee?

Computers and Technology
1 answer:
Airida [17]3 years ago
8 0

Answer:

A service company.

Explanation:

hope it helps!

You might be interested in
. Consider the following brute-force algorithm for evaluating a polynomial. ALGORITHM Brute Force Polynomial Evaluation(P[0..n],
podryga [215]

Answer:

The answer of the the following question are 0(n^2)

The total number of multiplication is 2

And the total number of addition is 1

Explanation:

Let the size of the input is the degree of the polynomial = "n"

Than the number of the multiplications depends on "n"

Let the number of multiplication = M(n)

Let the number of addition = A(n)

1): Solution-

M(n) = n∑_{i=0}          i∑_{j=1}          2

= 2     n∑_{i=0}           i∑_{j=1}  

= 2      n∑_{i=0}      i-1+1

= 2      n∑_{i=0}     i

= 2  *  n*(n+1)/2    =   n*(n+1)

= n^2 + n ∈ 0(n^2)

2): Solution for addition-

A(n) = n∑_{i=0}          i∑_{j=1}          1

= by solving this from the same way it leads to

= n^2 + n   and n^2 + n ∈ 0(n^2)

7 0
3 years ago
Which function key will help you find the word and replace
MaRussiya [10]

F5 key on your keyboard in word and power point if that is what you are referring to.


3 0
3 years ago
The term which refers to the attempt to gain unauthorized access to systems and computers used bya telephone company to operate
Alex787 [66]

Answer: Phreaker

Explanation:

Phreaker is defined as the unauthorized attack on  authorized communication system for stealing and manipulation phone networks.

  • Exploring,searching and identifying telecommunication field with help of technologies,equipment,tools etc is done to exploit the system and resources .
  • Other options are incorrect because phone hacking is attacking phone device, [email protected] is also hacking source and hacktivist hacks system to impact social and political field.
  • Thus, the correct option is option(d)
8 0
3 years ago
What is better for the sd card use as portable storage or use as internal storage?
Sever21 [200]
It depends on what you’d need it for.

> Portable Storage <
- Good for traveling.
- Good for porting stuff from a device to another device.

> Internal Storage <
- Better if you are using it for one device.
- Increase device storage.
5 0
3 years ago
A software application used at one computer to interact with other nodes on a network is called_____.
Ivanshal [37]

Answer:

A MIRCOCOMPTER NETWORK

Explanation:

3 0
4 years ago
Other questions:
  • While traveling in India, Sabina notes all of her daily expenses in rupees in her spreadsheet. At the end of the day, she wants
    5·2 answers
  • Information gathered from observing a plant grow 3 cm over a two-week period results in _______.a. inferences. b. variables. c.
    11·1 answer
  • Riodic Table
    6·1 answer
  • Practice with CSS. a. Write the CSS for an HTML selector footer with the following characteristics: a light-blue background colo
    11·1 answer
  • What does this mean in python?
    5·1 answer
  • Wireless networks use radio frequency (RF) or radio techniques, which allows wireless transmissions to reach out in all directio
    6·1 answer
  • What is the bit pattern (raw binary) of the single precision representation of the decimal number 0.125 following IEEE 754 stand
    9·1 answer
  • What is Mobile Edge Computing? Explain in tagalog.​
    5·2 answers
  • Slack how to enable direct message to outside workspace
    15·1 answer
  • 3.12 LAB: Output range with increment of 5 Write a program whose input is two integers, and whose output is the first integer an
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!