Answer:
Spectrem
Explanation:
Guys, please help me asap (Photo Attached) !!!!!!! HELP 25pts!!!!
Answer:
20%
Convert fraction (ratio) 30 / 150 Answer: 20%
The first one.
Please I need one more braniest for 'expert' may I get it?
Explanation:
What is the purpose of a Hyperlink
Can you answer both
Answer:
Number 16 is A Or B And Number 17 is B I think
Explanation:
The Bellman-Ford algorithm for the shortest path problem with negative edge weights will report that there exists a negative cycle if at least one edge can still be relaxed after performing nm times of relaxations. The algorithm, however, does not specify which cycle is a negative cycle. Design an algorithm to report one such cycle if it exists. You should make your algorithm runs as fast as possible.
Answer:
- Iterate over the Bellman-Ford algorithm n-1 time while tracking the parent vertex and store in an array.
- Do another iteration and if no relaxation of the edges occurs in the nth iteration then print of return "There are no negative cycle".
- Else, store the vertex of the relaxed edge at the nth iteration with a variable name.
- Then iterate over the vertexes starting from the store vertex until a cycle is found then print it out as the cycle of negative weight.
Explanation:
The Bellman-Ford algorithm can be used to detect a negative cycle in a graph. The program should iterate over the algorithm, in search of a relaxed edge. If any, the vertex of the specified edge is used as a starting point to get the target negative cycle.
Which Cisco IOS command will permit the engineer to modify the current configuration of the switch while it is powered on?
You are part of a sales group that has been asked to give a presentation.
Before you begin, what should you and your group do?
O A. Figure out who is the best public speaker.
O B. Look into file-sharing options so that everyone can work on the
same file at the same time.
OC. Buy the best software on the market.
O D. Ask if you have to give a slide presentation.
g A CPU is equipped with a cache; Accessing a word takes 20 clock cycles if the data is not in the cache and 5 clock cycles if the data is in the cache. What is the effective memory access time in clock cycles if the hit ratio is 90%
Answer:
6.5
Explanation:
The formula to calculate the efficiency is;
= (cache-click-cycle x hit ratio) + ( memory-clock-cycle x 1 - hit ratio)
= (5 x 0.9) + ( 20 x 0.1)
= 4.5 + 2
= 6.5
In this exercise we have to use the knowledge of efficiency, in this way, using the data already informed, we can say that the result of this is:
6.5 effective memory
In this exercise, it was informed that some conditions must be established, that is:
Hit radio: 90%Memory: 20Cache: 5
The formula to calculate the efficiency is;
[tex]efficiency= ((cache-click-cycle)(hit \ ratio)) + ( (memory-clock-cycle)(1 - hit \ ratio))[/tex]
Substituting the known values in the formula above, we find that:
[tex]= (5)(0.9) + ( 20)(0.1)\\= 4.5 + 2\\= 6.5[/tex]
See more about efficiency at brainly.com/question/6672666
what is the operating system on an IBM computer?
Answer:
OS/VS2 and MVS
Explanation:
Generally speaking, digital marketing targets any digital device and uses it to advertise and sell a(n) _____.
religion
product or service
governmental policy
idea
Answer:
product or service
Explanation:
Digital marketing is a type of marketing that uses the internet and digital media for the promotional purposes. It is a new form of marketing where the products are not physically present. The products and services are digitally advertised and are used for the popularity and promotion. Internet and digital space are involved in the promotion. Social media, mobile applications and websites are used for the purpose.
Answer:
A.) Product or service
Explanation:
Digital marketing is the practice of promoting products or services through digital channels, such as websites, search engines, social media, email, and mobile apps. The goal of digital marketing is to reach and engage with potential customers and ultimately to drive sales of a product or service. It can target any digital device that can access the internet, and it can use a variety of techniques such as search engine optimization, pay-per-click advertising, social media marketing, content marketing, and email marketing to achieve its objectives.
Most presentation programs allow you to save presentations so they can be viewed online by saving them as ____
files.
Explanation:
Most presentation programs allow you to save presentations so they can be viewed online by saving them as html
files.
Most presentation programs allow you to save presentations so they can be viewed online by saving them as html files.
Even with a quality burglary-resistant chest on the premises, special function locks may be appropriate because:________.
a. A dishonest worker might open the safe at night .b. A burglar may force a worker to open the safe during working hours.c. Without special locking devices, workers may be tempted to leave the safe unlocked for easy access during the day.d. All of the above
Answer:
d ) all of the above
Explanation:
is the correct answer
Why are people's visions of utopias and dystopias subjective?
A. Because the vision one person has of paradise will likely match
the vision most people have of a utopia
B. Because only certain technologies make things better and
different ones make things worse in a dystopia
C. Because all technology is dangerous and can lead to the downfall
of all societies, resulting in dystopia
D. Because the technology needed for one person's utopia may be
what creates disaster for another person's dystopia
Answer:
D. Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia.
Explanation:
Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia are people's visions of utopias and dystopias subjective. Thus option D is correct.
What are utopias and dystopias?Speculative fiction categories that study social as well as political structures include utopian and dystopian literature. In order to pique readers' interest, utopian fiction often depicts a world that adheres to the author's ethics and has many elements of a different reality.
Ultimately, it all varies depending on who you ask. A person's dystopia may be another person's utopia. We don't all have the same notions regarding what a utopia would look like, which is, in my opinion, one of the grounds why people don't live in one. Therefore, option D is the correct option.
Learn more about utopias and dystopias, Here:
https://brainly.com/question/905235
#SPJ2
does anyone know how to code
Answer:
no
Explanation:
i do not know how to code
Which important aspect of the Roman Empire did the barbarians destroy?
Answer:
centers of learning
Explanation:
Under the leadership of Emperor Valens, Rome was already having financial hardships. This meant that it didn't have enough money left to repair its empire nor to strengthen it against invaders. Soon, the barbarians such as the Franks, Huns, Saxons, etc. started attacking Rome. They spent a lot of time destroying the outer regions of the empire because they were also at war with each other. They penetrated Rome and it soon fell. The barbarians didn't only destroy the cities but they also destroyed the "centers of learning." Roman people were known to value education. With the fall of the Roman Empire, so did education and sophisticated architectures follow.
Answer:
i dont know but them barbs are crazy can't believe they were a thing back then
Explanation:
lol
what is spread sheet software?
Answer:
The answer to this question is given in the explanation section.
Explanation:
This is a type of software which show us data in tabular form. These software can easily store, analyze and organize data.
They are divided in rows and columns. They are mainly used for accounting and book keeping.
The commonly used spread sheet software in the market are MS Excel by Microsoft, Calc by libre office.
Should video gaming be considered a school sport?
Answer:
I believe it should be in higher grades such as high school or college so people don't abuse it like little kids might.
Answer:
No because the defininition of sports is an activity involving physical exertion and Video games don't involve physical extertion.
The purpose of __________________ is to isolate the behavior of a given component of software. It is an excellent tool for software validation testing.a. white box testingb. special box testingc. class box testingd. black-box testing
Answer:
d.) black-box testing
Explanation:
Software testing can be regarded as procedures/process engage in the verification of a system, it helps in detection of failure in the software, then after knowing the defect , then it can be corrected. Black Box Testing can be regarded as a type of software testing method whereby internal structure as well as design of the item under test is not known by one testing it. In this testing internal structure of code/ program is unknown when testing the software, it is very useful in checking functionality of a particular application. Some of the black box testing techniques commonly used are; Equivalence Partitioning, Cause effect graphing as well as Boundary value analysis. It should be noted that the purpose of black-box testing is to isolate the behavior of a given component of software.
Is anyone else having an issue with brainly mobile, where they don't let you watch ads? If so, what do you do to fix it?
Answer:
no im not
Explanation:
but i sorry that you are
8. Write the examples of freeware and Shareware softwares ?
Explanation:
People use freeware software because it is available free of cost and it can be distributed free of cost, that is why it is called FREEware.
Freeware software:
Adobe PDF
yahoo messenger
Go.ogle Talk
MSN messenger
People use shareware software because it helps them to know about the product more before buying it and this software is available free of cost.
Shareware software:
Adobe acrobat 8 professional
Winzip
Getright
Question # 6
Dropdown
Choose the correct ending to the sentence below.
The function localtime() _____________________
Answer:
returns a different value every time you use it
Explanation: :)
The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's software and hardware infrastructure. Is this statement true or false?A. TrueB. False
Answer:
False
Explanation:
The answer to this question is false. This is because the NVD doesn't perform such tests on their own. Instead they they rely on third-party vendors, software researchers, etc to get such reports and do the assignment of CVSS scores for softwares
The National Vulnerability Database (NVD) is the United State governments leading resource for software vulnerability
Suppose that a t-shirt comes in five sizes: S, M, L, XL, XXL. Each size comes in four colors. How many possible t-shirts are there?
Answer:
120
Explanation:
This question is basically asking how many ways can we arrange 5 sizes of shirts if they come in 4 colors.
5 permutation of 4
To find permutation, we use the formula
P(n, r) = n! / (n - r)!
Where
n is the size of the shirts available, 5
r is the color of each shirt available, 4
P(5, 4) = 5! / (5 - 4)!
P(5, 4) = (5 * 4 * 3 * 2 * 1) / 1!
P(5, 4) = 120 / 1
P(5, 4) = 120
Therefore, the total number of shirts available is 120
g Assume that this program is run on a processor with data cache of size big enough that the entire array arr can fit in the cache. (a) How many paths does the function foo of this program have
Answer:
A. 2
Explanation:
The food function in the C source code uses two for loop statements to fill and array of size 100 with 100 values ranging from 1 to 100 and the second to get the total sum to the values in the array. With this, two program paths are created.
why does this site suck so much?
Like why do I have to pay MONEY to get answers?
Answer:
you can answer ppl question to get points to ask questions
Explanation:
thats what i do and its free
Answer:
Money :))
They get revenue off of ads and that cash from your purchases to keep the site and themselves running.
AND REMEMBER: NOTHING IS FREEEEEEE
What is the name for non-paid active links returned by an Internet search engine in the search results?
O sponsored links
O organic links
O dead links
O relevant links
Answer: b
Explanation:
If an object someThing has a method someMethod( ), then you can call the method using the statement ____________ .
a. someMethod(someThing);
b. someThing.someMethod( );
c. someMethod.someThing() ;
d. someThing = someMethod( );
Answer:
C) someThing.someMethod( )
Explanation:
The methods in a class can be accessed outside the class (assuming they are public methods and not private to the class) by using the dot(.) symbol and calling the method on the instance or object of the class.
In this case, the object of the class someThing, calls the method, someMethod( ) by using a dot and the name of the method with a parentheses at the end. This enables the code in the method act on the class instance or object.
Is it important to use varied methods when creating digital media presentations? Why or why not?
Yes, because no one method is capable of adequately delivering the information.
No, because using more than one method is confusing to the audience.
No, because the different methods are incompatible with each other.
Yes, because it makes the presentation more interesting for the audience.
If a computer reboots itself on its own, the computer might have a(n) access problem. hardware problem. Internet problem. software problem.
Answer:
D) Software problem
Explanation:
plz give me brainliest
D
edge2021 YWWWWWWWWWWWWWWWWWWWWW
Designing the right elements for the tasks that the user is attempting to perform is called ________.
Answer:
Interface design
Explanation:
INTERFACE DESIGN are design that are carried out on either a computer or a mobile phone or other devices that will suit the users by designing the style of the devices and how the device will look like which will inturn enable the user to easily carried out or performed any tasks they are want to perform with easy and without any lapses which is why it is important for INTERFACE DESIGN to be design with the right tools that the user can easily understand in order to access and perform their tasks effectively.
having a bad day? enjoy this front view of phinias (can't spell his name)
Answer:
ouch what happened to him
congrats you ruined my childhood
(thanks for the free points!!)
help please with the question in the photo
Answer:
A
Explanation:
A because, why would someone want to listen to your own interests?