1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
2 years ago
13

Which option is an example of an algorithm that is used in daily life?

Computers and Technology
1 answer:
Luda [366]2 years ago
7 0

Answer:

Recipes

Explanation:

Recipes. Just like sorting papers and even tying your shoes, following a recipe is a type of algorithm. The goal of course being to create a duplicated outcome. In order to complete a recipe you have to follow a given set of steps.

Hope it helps you and give me a brainliest

You might be interested in
Please Help! I will give a Brainliest to anyone who answers with the right answer! Please and Thank You! What view is most often
Nata [24]

Answer:

form is used ethier to display or enter data in access 2016

8 0
3 years ago
Java Eclipse homework. I need help coding this
Maslowich

public class ArithmeticAssignment {

   public static void main(String[] args) {

       Tester test = new Tester();

       test.printTester();

   }

   

}

class Tester{

   Tester(){

       

   }

   void printTester(){

       int i1 = 79 + 3 * (4 + 82 -68) - 7 +19;

       int i2 = (179 +21 +10) / 7 + 181;

       int i3 = 10389 * 56 * 11 + 2246;

       System.out.println(i1);

       System.out.println(i2);

       System.out.println(i3);

   }

}

I think this is what you wanted. I hope this helps!

5 0
3 years ago
4.) Food cost for your restaurant is about $.38 on the dollar. That means for every dollar
Burka [1]

Answer:

38 cents on the dollar means that the cost is 38%. So for each of the costs, multiply by 0.38 (38%) to get the cost.

$3459*0.38=$1314.42

$2976.81*0.38 = 1131.1878 or about $1131.19

etc.

7 0
3 years ago
What is filter in computer​
Inessa [10]

Answer:

hope it helped you a little

4 0
3 years ago
unexpected file format. please use tab-delimited bed, gff, or vcf. perhaps you have non-integer starts or ends at line 1?
Anon25 [30]

In case of the problem or error below, the issue is because the fields are said to be separated by a TAB as well as an extra space before "to" .

<h3>What is the error about?</h3>

In coding, one can encounter a lot of error. It can be a simple dot or even a hash tag.

Therefore,  note that BEDTools is one that givesa lot of file formats it is said to supports. So, the  Fields in a file need to be separated by TAB and the use of only TABs.

The example of an entry that can lead to this error is"

chrX<TAB><SPACE>136520467<TAB><SPACE>136520477

or say

chrX<TAB>136520467<SPACE><TAB>136520477<SPACE>

Therefore, In case of the problem or error below, the issue is because the fields are said to be separated by a TAB as well as an extra space before "to"

Learn more about coding error from

brainly.com/question/18497347

#SPJ1

See full question below

windowBed -a macs.bed -b gps.bed

Unexpected file format. Please use tab-delimited BED, GFF, or VCF.

Perhaps you have non-integer starts or ends at line 1?

Also these are few sample lines from bed file.

gps.bed

chrX 136520467 136520477

chr18 50319147 50319157

chr21 9827099 9827109

chr9 42819113 42819123

chrX 108297487 108297497

macs.bed

chr1 27856 29322

chr1 442104 442496

chr1 540185 540811

chr1 564698 565448

chr1 713184 714252

chr1 761694 762974

5 0
2 years ago
Other questions:
  • Processing is handled by the computer’s central processing unit (cpu).​ <br> a. True <br> b. False
    6·1 answer
  • He primary purpose for attackers to send port scanning probes to hosts is to identify which ports are open. true false
    5·1 answer
  • Java allows you to declare methods with the same name in a class. this is called
    10·1 answer
  • When doing black and white photography, which file format should you use if possible? JPEG TIFF PNG RAW
    11·2 answers
  • Which of the following best describes a hacktivist? Select one: a. An individual who attempts to destroy the infrastructure comp
    6·1 answer
  • Exercise 3.7.1: Proving statements about odd and even integers with direct proofs. info About Each statement below involves odd
    6·1 answer
  • Brainliest forrrrrrr frrrrrew right herrreeee
    14·1 answer
  • Which of the following events happened first
    15·2 answers
  • Lesson 12: while loops with the farmer. Number 9.
    10·2 answers
  • You must configure a certificate authority on your network to use EFS. True or False?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!