Let's say set1 contains the following values: 1, 2, 3. set2 contains 3, 4, 5. Please name the difference between set1 and set2:

a. 4,5
b. 3
c. None of the above / below.
d. 1,2,3,4,5
e. 1,2

Answers

Answer 1

Answer:

c

Explanation:

None of the above /below


Related Questions

Who made computer ? Which year?

Answers

Answer:

The first computer that resembled the modern machines we see today was invented by Charles Babbage between 1833 and 1871.

Answer:

Charles Babbage in 1991

why do many webpages use graphical design and images

Answers

Answer:

Many web pages use graphical designs and images because people are drawn more to images and graphics than just plain text.

Write short note on:
i) keyboard
ii) Web camera

Answers

Um I’m not sure about that
_ Stay positive because failure is sort of success
_ dream big work hard
_no caption the ____ said it all

Which of these areas of technology best classifies television?

a. Information and Communication

b. Bio-related and Agricultural

c. Medical

d. Environmental

e. Production, which includes manufacturing and construction

f. Transportation

g. Energy and Power

h. Nanotechnology

Answers

Answer:

a. Information and Communication

h. nanotechnology

Explanation:

[tex].[/tex]

.
Where should you select to create a bibliography citation source?
A. At the end of the text you want to cite
B. At the top of the page
C. At the beginning of the text you want to cite
D. At the bottom of the page

Answers

A) at the end of the text you want to cite

If someone has the IP address 127.0.0.1 and tries to connect to the address 127.255.252.255, which are they attempting to connect to: ________

a. The local loopback interface
b. The local router on the network
c. The internet
d. A private server located on the local network

Answers

B is the answer i think

What are the things you needed to create a bootable USB Windows Installera​

Answers

Answer:

RUFUS

Explanation:

Try installing rufus software and burn the ISO file on your USB by choosing appropriate partition scheme MBR or GBT.  Usually MBR works for all computers but GPT is for new systems with latest technology.

Please answer this, don't skip please. I would really appreciate if you had knowledge over this question and helped out :)

1) The tag is the second of two main parts of a web page. The information between the opening and closing tag is seen by web page visitors in the browser window. True or False
2) The area is the first of two main parts of a web page. The header is where the operation code resides. True or False


3) The next tag is the tag - the head is the first of two main parts of a web page. The head is where the operation code resides. True or False

Answers

Answer:

1) they are only visible to the to the person/people who are running the website. therefore the answer to that statement is false.

2) they operation code of a website resides at the end of a address, therefore that statement is also false

Explanation:

_ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless networks.

Answers

The right answer will be "The Internet of Things (IoT)".

Connecting computers systems, electromechanical machinery as well as digital ones with distinctive identifications as well as the possibility of transference of information through the internet without interactivity as well as people.Such an IoT system would be a collection of web-enabling connected devices which employ embedded subsystems, particularly CPUs, captors, and networking gear, to gather as well as transmit information from their surroundings and execute upon that.

Learn more about IoT here:

https://brainly.com/question/19995128

Comparison
Cloud computing and parallel processors

Answers

Anwser is 2/3

Explanation:

_____________ is driving a complete reanalysis of what information is collected and how it is presented, navigated, and used internally.

Answers

“Internal Self-Service” is driving a complete reanalysis of what information is collected and how it is presented, navigated, and used internally.

what is web browser give answerwh
at is web browser

Answers

Answer:

A software application used to access information on the World Wide Web is called a Web Browser.

Explanation:

When a user requests some information, the web browser fetches the data from a web server and then displays the webpage on the user's screen.

in media literacy,
how does media influence public? and the press

⚫ analyze or compare the influences of social media
⚫ analyze the ethics or journalist, news outlets, etc​

Answers

what is mean by computers

what is computer virus​

Answers

Answer:

A type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.

Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.

Answer:

Computer virus :

In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.

Identify the technique to free up the CPU by allowing device controllers to independently transfer data between the device and main memory.
a. Programmed I/O.
b. Direct Memory Access (DMA).
c. Polling.
d. CPU interrupt.

Answers

Answer:

B. - Direct Memory Access (DMA)

Explanation:

...

Direct Memory Access (DMA) is the technique to free up the CPU by allowing device controllers to independently transfer data between the device and main memory. Thus, option B is correct.

What is Direct Memory Access?

Direct memory access is a computer system feature that allows some hardware subsystems to access main system memory without relying on the central processor unit.

Direct memory access (DMA) is the method of transmitting data without using the CPU. It is frequently used to transport data to and from input/output devices. To manage the transfer, a second DMA controller is necessary.

DMA is a mechanism that allows an input/output (I/O) device to transmit or receive data directly to or from main memory, bypassing the CPU to speed up memory operations. A chip known as a DMA controller manages the process (DMAC).

Therefore, option B is correct.

Learn more about the Direct Memory Access, refer to:

https://brainly.com/question/7218477

#SPJ5

Saving means

A) Copying data from memory to disk

B) Copying data from disk to
memory

C) Preserving a program

D) Storing data in a program

Answers

Answer:

To copy data from a temporary area

2) A comunicação é um dos gerenciamentos mais relevantes a serem definidos no início do projeto, mas especificamente no grupo de processo de planejamento. Pois será por meio desta definição que todos deverão manter a distribuição da informação de forma clara e objetiva, principalmente o gerente de projeto.

De acordo com as informações apresentadas no quadro a seguir, faça a associação dos métodos de comunicação na coluna A com as suas respectivas descrições na Coluna B e as TICS na Coluna C referente ao método de comunicação.

Coluna A - Métodos de comunicação

Coluna B - Descrição

Coluna C - TICs

I.Comunicação Interativa
a. Útil para informar muitas pessoas, com grandes volumes de informação. De forma geral as pessoas acessam o conteúdo remotamente, escolhendo quando querem obter as informações, especificando um tempo para isso acontecer.
1. e-mails, cartas, correio de voz, relatórios, mensagens por meio do celular etc.

II.Comunicação ativa (push)
b. Troca de informações entre dois ou mais stakeholder. Esta é a maneira que se entende ser a mais eficiente para garantir um entendimento comum a todos os envolvidos
2. Intranets, e-learning e portais de conhecimento corporativo etc.

III.Comunicação passiva (pull)
c. Devem ser direcionadas para os interessados específicos, que foram designados a obter as informações ou que necessitam destas. De forma geral não se tem garantias de que a informação foi recebida ou mesmo compreendidas, só havendo a garantia da distribuição
3. Reuniões presenciais ou a distância por meio de vídeo conferência, telefone ou Internet.



Assinale a alternativa que apresenta a associação CORRETA entra as colunas.

Alternativas:

a)
I – b – 2; II – c – 1; III – a – 3.

b)
I – b – 3; II – c – 1; III – a – 2.

c)
I – c – 3; II – a – 1; III – b – 2.

d)
I – a – 2; II – c – 3; III – b – 1.

e)
I – b – 1; II – a – 2; III – c – 3.

Answers

I’m so sorry but I need points but I hope you find the answer

Juan is a network administrator and must set up a VPN for his company's network. To allow safe communication, he should

select Control Panel, then Network Protocols, then Internet
select the radio button, then change the adapter settings protocol
select the Security tab, then PPTP, and then Allow Protocols
select Set Up a Public Connection, then Disable Protocols

Answers

Answer:

select Control Panel, then Network Protocols, then Internet

Explanation:

Seeing as Juan is a network admin, he has access to the programs of the computer. Being tasked with setting up a VPN, he must go to the control panel, then network protocols (to see the network rules, per say), then the internet tab to finally set up the VPN.

To allow safe communication, Juan must select control panel  then, network protocols, and then  internet. Therefore, option A is correct.

What is VPN ?

You can interact secretly and securely within your corporation using a virtual private network (VPN), which is an extension of a company's intranet over the preexisting structure of either a public or private network.

The i5/OS operating system is utilised by both businesses, and a VPN connection can give them the protection they require to communicate between their respective networks. Compared to using conventional non-switched lines, creating a VPN is more cost-effective.

To allow a safe communication, the network operator should allow the internet protocol to interpret and which can be activated from the control panel. Hence, option A is correct.

Find more on VPN:

https://brainly.com/question/29432190

#SPJ3

True or False, In adversarial searching, agents using the MiniMax algorithm always select the state that has the highest guaranteed net value.

Answers

Answer:

True

Explanation:

The MiniMax algorithm computes the MiniMax decision from the current state. The MiniMax algorithm always is especially known for its usefulness in calculating the best move in two-player games where all the information is available


"Desktop" is a computer term that refers to:
a) The initial screen showing icons for folders, files, and applications
b) The part of your work area where the computer monitor sits
c) Something that can and should be ignored by most users
d) The st of all the contents on a particular computer
e) None of the above
1 BACK

Answers

Answer:

a) The initial screen showing icons for folders, files, and applications

"Desktop" is a computer term that refers to: a) The initial screen showing icons for folders, files, and applications.

What is a computer?

A computer can be defined as a programmable-electronic device that is designed and developed to receive data in raw form as an input and then processes these data into an output (useful information) that could be used by an end user.

What is a computer desktop?

A computer desktop refers to the initial screen or homepage that automatically comes up after a computer successfully completes a boot-up process. Thus, a computer desktop is considered to e the homepage of a computer.

Furthermore, a computer desktop can be used to display or show the icons for the following items:

FilesRecycle binFoldersSoftware application

Read more on computer here: https://brainly.com/question/959479

Draw a system flowchart illustrating the steps performed by an operating system as it executes the instruction to back up a disk on a single-user computer system.

Answers

The flowchart's pseudo code is as follows:

The command BACKUP user issues through the user interface.UI executes the awakening File Manager instruction.File Manager resolves the address of a backup file that wakes up Device Manager.Device Manager opens the drive access path to back files in the Memory Manager I/O buffer that reads the file (or part of the data).In the I/O buffer, Memory Manager assigns memory to the processor manager.Processor Manager loads the I/O buffer memory file, and File Manager awakens.File Manager determines the document address be copied into the Processor Managers new disc.The Device Managers, Processor Manager copies memory to the I/O buffer.This device manager enables you to open a drive access path where a new disc awakens file manager will be duplicated by the I/O buffer.File Manager decides whether the file is copied completely If yes if you are jumping to point 11, you decide the next area of the file that will be backed up and Device Manager is returning to point 4.File Manager decides if this is the last backup item, if not, it wakes up Manager of Processor Activates Processor Manager for sending interface File N is backed up for a client can jump back to point 3 if affirmative. The Processor Manager activates the user interface to send the user message 'All files have been backed up'.

Learn more:

brainly.com/question/17373574

brainly.com/question/13152070

A Lost link is an interruption or loss of the control link between the control station and the unmanned aircraft, preventing control of the aircraft. As a result, the unmanned aircraft performs pre-set lost link procedures. Such procedures ensure that the unmanned aircraft:

Answers

Answer:

There is nothing to answer from this statement.

Explanation:

Can you rephrase the statement into question?

4. What is an Abacus?​

Answers

Explanation:

an abacus is a simple device for calculating, consisting of a frame with rows of wires or grooves along which beads are slid.

2. Which of these Is NOT part of the definition of Electricity?

A. Ability to do work

B. Closed Circuit

C. Power Supply

D. Movement of electrons

Answers

Answer:

B. closed circuit

Explanation:

please follow me

hope it helps you

Run the program and observe the output to be: 55 4 250 19. Modify the numsInsert function to insert each item in sorted order. The new program should output: 4 19 55 250.
#include
#include
using namespace std;
void numsInsert(vector& numsList, int newNum) {
unsigned int i;
for (i = 0; i < numsList.size(); ++i) {
if (newNum < numsList.at(i)) {
// FIXME: insert newNum at element i
break; // Exits the for loop
}
}
// FIXME: change so executes if higher number NOT found
// Change "true" to "i == ??" (determine what ?? should be)
if (true) { // No higher number was found, so append to end
numsList.push_back(newNum);
}
}
void numsPrint(const vector& numsList) {
unsigned int i;
for (i = 0; i < numsList.size(); ++i) {
cout << " " << numsList.at(i) << endl;
}
}

int main() {
vector numsList;
numsInsert(numsList, 55);
numsInsert(numsList, 4);
numsInsert(numsList, 250);
numsInsert(numsList, 19);
numsPrint (numsList);

return 0;
}

Answers

Answer:

#include <iostream>

#include <vector>

using namespace std;

void numsInsert(vector<int>& numsList, int newNum) {

   unsigned int i;

   for (i = 0; i < numsList.size(); ++i) {

       if (newNum < numsList.at(i)) {

           // FIXME: insert newNum at element i

           numsList.insert(numsList.begin() + i, newNum);

           break; // Exits the for loop

       }

   }

   // FIXME: change so executes if higher number NOT found

   // Change "true" to "i == ??" (determine what ?? should be)

   if (i == numsList.size()) { // No higher number was found, so append to end

       numsList.push_back(newNum);

   }

}

void numsPrint(const vector<int>& numsList) {

   unsigned int i;

   for (i = 0; i < numsList.size(); ++i) {

       cout << " " << numsList.at(i) << endl;

   }

}

int main() {

   vector<int> numsList;

   numsInsert(numsList, 55);

   numsInsert(numsList, 4);

   numsInsert(numsList, 250);

   numsInsert(numsList, 19);

   numsPrint(numsList);

   return 0;

}

Explanation:

List the resulting array after each call of the merge method. Indicate the number of character-to-character comparisons made for each call to merge (line 22 of the merge method at the end of the assignment). Sort the following array of characters into alphabetical order: C Q S A X B T.
01 public static void mergesort (char[] a, int i, int r){
02
03 if (1 >= r) {
04 return;
05 }
06 int middle = (1+r)/2;
07 mergesort(a, l, middle);
08 mergesort(a, middle+1, r);
09 merge(a, l, middle, r);
10 }
11
12 public static void merge (char[] a, int i, int m, int r){
13
14 //copy lower half of the array into b
15 char [] b = new char[m-1+1];
16 for (int i = 0; i <= m-1; i++ ) {
17 b[i] = a (1+i);
18 }
19
20 int i = 0, j m+1, k = 1;
21 while (i <= m-1 && j <= r ) {
22 if (a[j] < b[i]) {
23 a[j];
24 k += 1;
25 j += 1;
26 } else {
27 a[k] b[i];
28 k += 1;
29 i += 1;
30 }
31 }
32 while (i <= m-1) {
33 a[k] b[i];
34 k += 1;
35 i += 1;
36 }
37 while ( j <= r ) {
38 a[k] a[j];
39 k += 1;
40 j += 1;
41 }
42 }

Answers

Answer:

40j

Explanation:

the no. divided by one is that no.

Suppose you are asked to design a rotating disk where the number of bits per track is constant. You know that the number of bits per track is determined by the circumference of the innermost track, which you can assume is also the circumference of the hole. This, if you make the hole in the center of the disk larger, the number of bits per track increases, but the total number of tracks decreases. If you let r denote the radius of the platter, and x · r the radius of the hole, what value of x maximizes the capacity of the disk?

Answers

Answer:

suppose i was i would tell them i dont know and walk away

Explanation:

in thoery this is correct

you said suppose so i answerd

there is no use in reporting or getting this taken down

nether is it right

im not stealing points

Because in thoery its an answer

THIS IS MY PROTEST

When it comes to different ways of storing data on the device in a cross-platform manner, what is convenient about both native iOS and Android platforms?

a. they both provide secure file i/o
b. they both provide key-value, file i/o and sqlite data storage
c. the both provide the exact same system calls, since both platforms rely on ARM processors
d. they both provide the exact same APIs, regardless of language used

Answers

A - both provide secure file i/o

Suppose that a particular algorithm has time complexity T(n) = 3 \times 2^nT(n)=3×2 ​n ​​ and that executing an implementation of it on a particular machine takes tt seconds for nn inputs. Now suppose that we are presented with a machine that is 64 times as fast. How many inputs could we process on the new machine in tt seconds?

Answers

Hope this helps!

https://www.chegg.com/homework-help/questions-and-answers/suppose-particular-algorithm-time-complexity-t-n-3-x-2-n-executing-implementation-particul-q18423534

Software engineer is responsible for defining the level of maturity the software program must perfom at in order to declare software test

a. True
b. False

Answers

Answer:

true

Explanation:

Hope, it helps to you

Other Questions
Can someone help me for this question...please 1. Based on the Law of Conservation of Mass, if100g of sodium metal reacts with 25g ofchlorine gas, what will be the total mass of theproduct, sodium chloride, created in thechemical reaction?2 Na Cl22NaCl100gm + 25gm+? CAN SOMONE PLEASE HELP.a coin is weighed so the probability of landing head is 0.6. If this coin is flipped teice find the experimatal probabillaty of getting two heads.Anwser as a percent Out of 65 students, 35 like lays, 24 likes kurkure and 15 is do not like any of them,present the above information in a venn-diagram and find the number of a students who likeboth the items. Which ordered pair is a solution of the system of equations? y= 3x + 1 y= 5x - 1 A (2,3) (1,2) B (0, 1) D (1,4) How do you make all of the dilldings Complete each sentence with the correct pluperfect form of the verb in parenthesesCuando yo llegu, la liquidacin ya (terminar).Yo ya (abrir) el probador. Rosa dijo que ellos (ir) al departamento de ropa. El dependiente me (decir) que la cartera costaba cuarenta euros. Nosotros todava no (comprar) la falda. T le (preguntar) qu talla usaba? Find the exact value of cos A in simplest radical form. describe a person you know who is a good leader What is a "world view" and why is it important to studying history? State the Limitations of the first generation of computers What did the Spanish want to take to Spain and what did they want to do to the Indians?A.take slaves, give them ChristianityB.take gold, give them ChristianityC.take canolies, give them gunsD.take tobacco, give them gold If I'm 4years and my brother is half of my age now I'm 44 how old is he ? ASAP. Five stars + brainless.A procedure calls for 4 parts reagent A to 16 parts water.What is the dilution of reagent A in water?a) 4/16b) 1/5c) 1/4 d) 4/12 Can you guys plz help me WILL MARK BRAINLEST IF CORRECT! 1) Burning toast physical or chemical2) Cooking eggs: physical or chemical3) Melting butter: physical or chemical4) Removing the pulp (solid) from the orange juice using a juice strainer.: physical or chemical5) Cutting the toast with a knife: physical or chemical6) Digesting the food: physical or chemical PLEASE HELP!! WILL MARK BRAINLIST write 3 specific reasons why taxes help the youth, communities, and families. What does Plato mean by the statement he is always stirring up some war or other, in order that the people may require a leader? Woolworths had a going out of business sale. The price of a telephone before the sale was $39.98. What was the price of the telephone after a 30% discount? If the sale price of the same telephone had been $23.99, what would the percentage discount have been? Pls help me :) I would appreciate it