what is it when called when businesses produce goods and services that consumers do not want​

Answers

Answer 1
Unsought goods.

Nobody seeks them out, because no one wants them.

Related Questions

computer is an ............. machine because once a task is intitated computer proceeds on its own t ill its completion.​

Answers

Answer:

I think digital,versatile

computer is an electronic digital versatile machine because once a task is initiated computer proceeds on its own till its completation.

Given two regular expressions r1 and r2, construct a decision procedure to determine whether the language of r1 is contained in the language r2; that is, the language of r1 is a subset of the language of r2.

Answers

Answer:

Test if L(M1-2) is empty.

Construct FA M2-1 from M1 and M2 which recognizes the language L(>M2) - L(>M1).

COMMENT: note we use the algorithm that is instrumental in proving that regular languages are closed with respect to the set difference operator.

Test if L(M2-1) is empty.

Answer yes if and only if both answers were yes.

Explanation:

An algorithm must be guaranteed to halt after a finite number of steps.

Each step of the algorithm must be well specified (deterministic rather than non-deterministic).

Three basic problems:

Given an FA M and an input x, does M accept x?

Is x in L(M)

Given an FA M, is there a string that it accepts?

Is L(M) the empty set?

Given an FA M, is L(M) finite?

Algorithm for determining if M accepts x.

Simply execute M on x.

Output yes if we end up at an accepting state.

This algorithm clearly halts after a finite number of steps, and it is well specified.

This algorithm is also clearly correct.

Testing if L(M) is empty.

Incorrect "Algorithm"

Simulate M on all strings x.

Output yes if and only if all strings are rejected.

The "algorithm" is well specified, and it is also clearly correct.

However, this is not an algorithm because there are an infinite number of strings to simulate M on, and thus it is not guaranteed to halt in a finite amount of time.

COMMENT: Note we use the algorithm for the first problem as a subroutine; you must think in this fashion to solve the problems we will ask.

Correct Algorithm

Simulate M on all strings of length between 0 and n-1 where M has n states.

Output no if and only if all strings are rejected.

Otherwise output yes.

This algorithm clearly halts after a finite number of steps, and it is well specified.

The correctness of the algorithm follows from the fact that if M accepts any strings, it must accept one of length at most n-1.

Suppose this is not true; that is, L(M) is not empty but the shortest string accepted by M has a length of at least n.

Let x be the shortest string accepted by M where |x| > n-1.

Using the Pumping Lemma, we know that there must be a "loop" in x which can be pumped 0 times to create a shorter string in L.

This is a contradiction and the result follows.

COMMENT: There are more efficient algorithms, but we won't get into that.

Testing if L(M) is finite

Incorrect "Algorithm"

Simulate M on all strings x.

Output yes if and only if there are a finite number of yes answers.

This "algorithm" is well specified and correct.

However, this is not an algorithm because there are an infinite number of strings to simulate M on, and thus it is not guaranteed to halt in a finite amount of time.

COMMENT: Note we again use the algorithm for the first problem as a subroutine.

Correct Algorithm

Simulate M on all strings of length between n and 2n-1 where M has n states.

Output yes if and only if no string is accepted.

Otherwise output no.

This algorithm clearly halts after a finite number of steps, and it is well specified.

The correctness of the algorithm follows from the fact that if M accepts an infinite number of strings, it must accept one of length between n and 2n-1.

This builds on the idea that if M accepts an infinite number of strings, there must be a "loop" that can be pumped.

This loop must have length at most n.

When we pump it 0 times, we have a string of length less than n.

When we pump it once, we increase the length of the string by at most n so we cannot exceed 2n-1. The problem is we might not exceed n-1 yet.

The key is we can keep pumping it and at some point, its length must exceed n-1, and in the step it does, it cannot jump past 2n-1 since the size of the loop is at most n.

 This proof is not totally correct, but it captures the key idea.

COMMENT: There again are more efficient algorithms, but we won't get into that.

   Other problems we can solve using these basic algorithms (and other algorithms we've seen earlier this chapter) as subroutines.

       COMMENT: many of these algorithms depend on your understanding of basic set operations such as set complement, set difference, set union, etc.

Given a regular expression r, is Lr finite?

Convert r to an equivalent FA M.

COMMENT: note we use the two algorithms for converting a regular expression to an NFA and then an NFA to an FA.

Test if L(M) is finite.

Output the answer to the above test.

Given two FAs M1 and M2, is L(M1) = L(M2)?

Construct FA M1-2 from M1 and M2 which recognizes the language L(>M1) - L(>M2).

COMMENT: note we use the algorithm that is instrumental in proving that regular languages are closed with respect to the set difference operator.

Test if L(M1-2) is empty.

Construct FA M2-1 from M1 and M2 which recognizes the language L(>M2) - L(>M1).

COMMENT: note we use the algorithm that is instrumental in proving that regular languages are closed with respect to the set difference operator.

Test if L(M2-1) is empty.

Answer yes if and only if both answers were yes.

The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.
A. mathematical.
B. timing.
C. chosen ciphertext.
D. brute-force.

Answers

Answer:

chosen ciphertext

Explanation:

Chosen ciphertext attack is a scenario in which the attacker has the ability to choose ciphertexts C i and to view their corresponding decryptions – plaintexts P i . It is essentially the same scenario as a chosen plaintext attack but applied to a decryption function, instead of the encryption function.

Cyber attack usually associated with obtaining decryption keys that do not run in fixed time is called the chosen ciphertext attack.

Theae kind of attack is usually performed through gathering of decryption codes or key which are associated to certain cipher texts

The attacker would then use the gathered patterns and information to obtain the decryption key to the selected or chosen ciphertext.

Hence, chosen ciphertext attempts the use of modular exponentiation.

Learn more : https://brainly.com/question/14826269

Heinrich Koch is a second-year college student. Last semester his best friend had his laptop stolen. The laptop was an old computer that he planned to replace soon, but the greatest loss was his data: he had not performed a backup and all his data was lost. Heinrich himself does not perform data backups but knows that he needs to do that on a regular basis. He has decided to use an online backup service that will automatically back up his data whenever it changes. Evaluate and compare reviews of online backup services. Consider iDrive, Carbonite, Acronis True Image, BackBlaze, and others you might find in your research. Recommend a service that you consider the best solution for Heinrich. Discuss your reviews and mention speed, security, and features in your recommendation.

Answers

Answer:

Acronis True Image is the one I would recommend out of these mentioned online backup services.

Explanation:

The evaluations and reviews of each of the online backup services are as follows:

a. iDrive

For this, we have:

Speed = 60% - fair

Security = 100% - excellent

Privacy = 88% - very good

Features = 95% - excellent

Pricing = 85% - Very good

Because of its various features, pricing, and usability, IDrive reviews suggest that it is a very efficient online backup solution. However, there have been complaints concerning its speed and the fact that there are no monthly plans available.

b. Carbonite

For this, we have:

Speed = 60% - fair

Security = 100% - excellent

Privacy = 87% - very good

Pricing = 85% - very good

File backup and restoration = 75% - good

Carbonite reviews reveal that it is simple to use and provides limitless backup for one device. The main drawback is that it has extremely poor backup speeds.

c. Acronis True Image

This is fast, simple and intuitive

It has complete control over the backup updates, including how and when they occur.

It is not expensive.

Acrnonis True image is a powerful backup storage service. It enables data and file backup and restoration from USB drives.

Many reviewers of Acrnonis True image have stated that they have had no issues with its service, that it is worth purchasing, and that there are no concerns.

d. Backblaze

For this, we have:

Speed = 75% - good

Security = 75% - good

Privacy = 70% - decent

Pricing = 100% - excellent

Support = 95% - excellent

Features = 65% - decent

File back-up and restoration = 70% - decent

Backblaze is one of the most popular internet backup services. This storage service, however, does not allow for ustomization.

Recommendation

Acronis True Image is the one I would recommend out of these mentioned online backup services. This is due to the fact that it delivers a large amount of accurate and high-quality data storage. It is quick, simple and intuitive, which is what most people care about. Furthermore, reviewers have stated that this service is quite effective and that there have been very few issues with it. The other services demonstrate that their services have flaws, such as lack of customization and slowness.

How are dates and times stored by Excel?​

Answers

Answer:

Regardless of how you have formatted a cell to display a date or time, Excel always internally stores dates And times the same way. Excel stores dates and times as a number representing the number of days since 1900-Jan-0, plus a fractional portion of a 24 hour day: ddddd. tttttt

Explanation:

mark me as BRAINLIEST

follow me

carry on learning

100 %sure

Dates are stored as numbers in Excel and count the number of days since January 0, 1900. Times are handled internally as numbers between 0 and 1. To clearly see this, change the number format of cell A1, B1 and C1 to General. Note: apparently, 42544 days after January 0, 1900 is the same as June 23, 2016
Other Questions
Can someone helpppppppp The Wonderful Wizard of OzPassage AWhen Dorothy stood in the doorway and looked around, she could see nothing but the great gray prairie on every side. Not a tree nor a house broke the broad sweep of at country that reached to the edge of the sky in all directions. The sun had baked the plowed land into a gray mass, with little cracks running through it. Even the grass was not green, for the sun had burned the tops of the long blades until they were the same gray color to be seen everywhere. Once the house had been painted, but the sun blistered the paint and the rains washed it away, and now the house was as dull and gray as everything else.Passage BThe road was smooth and well paved, now, and the country about was beautiful, so that the travelers rejoiced in leaving the forest far behind, and with it the many dangers they had met in its gloomy shades. Once more they could see fences built beside the road; but these were painted green, and when they came to a small house, in which a farmer evidently lived, that also was painted green. They passed by several of these houses during the afternoon, and sometimes people came to the doors and looked at them as if they would like to ask questions; but no one came near them nor spoke to them because of the great Lion, of which they were very much afraid. The people were all dressed in clothing of lovely emerald-green color and wore peaked hats like those of the Munchkins.Questions :1- What is the most common color of the area around Dorothys home?2-What is the most common color of the surroundings in this passage?3-What do you think the author is trying to say about the differences in these two places? Find the value of y and show work A man pulls his dog (m=20kg) on a sled with a force of 100N at a 60 angle from the horizontal. What is the horizontal component of the force?A) 100NB) 196NC) 50ND) 86Nshow your work please Simplify the expression.... Who took control of the British War effort in the french revolution war? Which of the following describes elaboration When comparing two box-plots that show the same type of information, what determines agreement within the data?A.the range of the quartiles in each data setB.the median of each data setC.the mean of each data setD.the number of values in each data set Segment [tex]$s_1$[/tex] has endpoints at [tex]$(3+\sqrt{2},5)$[/tex] and[tex]$(4,7)$[/tex]. Segment [tex]$s_2$[/tex] has endpoints at [tex]$(6-\sqrt{2},3)$[/tex] and[tex]$(3,5)$[/tex]. Find the midpoint of the segment with endpoints at the midpoints of [tex]$s_1$[/tex] and [tex]$s_2$[/tex]. Express your answer as [tex]$(a,b)$[/tex]. joey is going shopping for a new pair of sneakers. He finds a pair that have an original price of $155. They are on sale today for 30% off. How much does Joey pay for the sneakers including 8% sales tax? Felix had changed his name from Fennix when he decided to convert to Protestantism and open a butcher shop. He was well known in the smallGerman town he lived in. Felix and his family attended church services along with everyone else. They had a modest house not far from thebutcher shop. Still, when the Nazis came looking for Roma, It was easy for them to spot Felix. How were they MOST likely able to tell that Felixwas not ethnically German?OA. Felix did not speak the German language.OB. Felix was transient like other Roma.C.Felix had dark skin that Identified him.OD. Felix had a Roma name, so they knew. Which fraction converts to a repeating decimal number?CA.112B.718C.12727D.E.610Reset What are the themes of the play a sunny morning? Complete accounting cycle and financial statementsThe city council of E. Staatsboro approved the following budget for the General Fund for fiscal year 2019.Estimated Revenues Property taxes $335,000 License fees 40,000 Fines and penalties 15,000 Total revenues $390,000Appropriations Salaries $350,000 Supplies and utilities 30,000 Debt service 3,000 Total appropriations 383,000Budgeted Increase in Fund Balance $7,000The postclosing trial balance for the fund, as of December 31, 2018, was as follows: Debits CreditsCash $15,000 Vouchers payable $8,000Fund balance (unassigned) 7,000 $15,000 $15,000The following transactions and events occurred during FY 2019.1. Levied property taxes of $335,000 and mailed tax bills to property owners.2. Borrowed $300,000 on tax anticipation notes at an interest rate of 1 percent per annum.3. Ordered supplies expected to cost $18,000.4. The supplies arrived, along with an invoice for $19,000; the city paid the invoice immediately.5. Received cash ($383,000) from the following sources: property taxes ($330,000), licenses and fees ($38,000), fines and penalties ($15,000).6. Paid cash for the following purposes: unpaid vouchers at the start of year ($8,000); salaries ($340,000); utility bills ($11,000).7. Repaid the tax anticipation notes 6 months after date of borrowing, with interest.8. Processed a budgetary interchange, increasing the appropriation for supplies and utilities by $2,000 and reducing the appropriation for salaries by the same amount.9. Will pay salaries for the last few days in December, amounting to $2,000, at the end of the first pay period in January 2020; also, received in early January 2020 a utilities invoice for $1,000 applicable to December 2019.Use the preceding information to do the following:a. Prepare journal entries to record the budget and the listed transactions and events.b. Prepare a preclosing trial balance.c. Prepare a balance sheet; a statement of revenues, expenditures, and changes in fund balance; and a budgetary comparison schedule. The Jenkins family's monthly budget isshown in the circle graph. The family has amonthly income of $4,800. How muchmoney do they spend on transportationeach month?Emergency fund5%Transportation5%Housing30%Medical22%Food15%Clothing6%Entertainment7%Savings10% computer is an ............. machine because once a task is intitated computer proceeds on its own t ill its completion. Which music professionals might perform on radio? The King ordered the young soldier tobe brought before him.Change it into Passive voice Pls help will mark brainliest and 30 points 1011+1111=in binary answer, anyone that answer me first I will follow u