1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiks02 [169]
3 years ago
15

Please help me on this it’s due now

Computers and Technology
1 answer:
Verizon [17]3 years ago
3 0
It’s C


i had the same thing and i picked c
You might be interested in
If a company doesn't distribute a computing use policy stating an employer's right to inspect employees' computers freely, inclu
tester [92]

Answer:

False

Explanation:

Without any police, a privacy can easily be compromised.

8 0
4 years ago
In the admin console, which three of these gmail settings can an administrator set for the entire domain? (choose 3)
ehidna [41]
<span>In the admin console, three settings than an admin can set for the entire domain in gmail are to enable users to set their own themes in gmail, allow users to delegate their mail out to other users, and enable users to have the ability to import their email from other platforms like yahoo, web mail, or hot mail.</span>
5 0
4 years ago
What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b
Paraphin [41]

Answer:

Answered below

Explanation:

Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.

Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.

Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.

3 0
3 years ago
The java compiler is able to find all programmer errors.
Troyanec [42]
No compiler can do that. Maybe with AI, but that's beyond the scope of a compiler.
5 0
4 years ago
Suppose that you sort a large array of integers by using a merge sort. Next you use a binary search to determine whether a given
klio [65]

Answer:

See explaination

Explanation:

Merge sort working-

1.type of recursive sorting algorithm.

2.divides given array into halves.

3. Sort each halves. Merge this halves to give a sorted array.

4. Recursive call continues till array is divided and each piece has only one element.

5. Merge this small pieces to get a sorted array.

Binary search-

1. It is a search algorithm.

2. Requires a sorted array to work on.

3.Works repetively dividing a half portion of list that could contain item until it has narrowed down the possible location to just one.

Comparing Merge sort and Binary Search using Big O notation-

Merge Sort - O(n*log(n)) in all scenario whether best, average or worst case.

Binary Search- O(log(n)) in average and worst case. O(1) in best case.

So seeing the above comparison Binary search is faster.

Comparing Binary search and displaying the integers-

Binary Search- O(log(n)) in average and worst case. O(1) in best case.

Displaying the integer-O(1) if already initialized, O(n) in case of loop or function.

So seeing above one can conclude that binary search is fast. But in best case both works in a similar manner.

6 0
3 years ago
Other questions:
  • Java allows you to declare methods with the same name in a class. this is called
    10·1 answer
  • Consider the following relation:CAR_SALE(Car#, Date_sold, Salesperson#, Commission%, Discount_amt)Assume that a car may be sold
    12·1 answer
  • While editing a film, a director feels that the actors have not enacted a particular scene well. What type of shot must the dire
    12·1 answer
  • Is this website real? Or is it a scam?
    11·1 answer
  • What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyz
    13·1 answer
  • The market is in <br> until the price of goods reflects equal supply and demand.
    10·1 answer
  • Write a recursive method that finds the number of occurrences of a specified letter in a string using the following method heade
    12·1 answer
  • How does porter’s competitive forces model help companies develop competitive strategies using information systems?
    13·1 answer
  • Miley met up with a bunch of her college friends after several years. She told them that she works for the sound department of a
    5·1 answer
  • Which of the following is a capital resource a computer programmer
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!