1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
2 years ago
5

Advantages and disadvantages of algorithm​

Computers and Technology
1 answer:
Maru [420]2 years ago
5 0

Answer:

\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\

Explanation:

It is easy to understand. Algorithm is a step-wise representation of a solution to a given problem. In Algorithm the problem is broken down into smaller pieces or steps hence, it is easier for the programmer to convert it into an actual program

Algorithms are time-consuming. Big tasks are difficult to put in algorithms. Difficult to show branching and looping in algorithms. Understanding complex logic through algorithms can be very difficult.

You might be interested in
If a full disk encryption (FDE) password is forgotten, what can be incorporated to securely store the encryption key to unlock t
Reptile [31]

Answer:

Key escrow.

Explanation:

If a full disk encryption (FDE) password is forgotten, a key escrow can be incorporated to securely store the encryption key to unlock the disk.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

<em>Therefore, when a full disk encryption (FDE) password is forgotten, a key escrow if incorporated can be used to retrieve the password. Subsequently, the password would then be used to unlock or decrypt the disk.</em>

3 0
3 years ago
Your company is trying to get out of the responsibility of purchasing and hosting its own hardware so it won’t have to finance o
kotykmax [81]
The answer is Software as a Service (SaaS).

SaaS is one of the 3 main categories of cloud computing. In SaaS, a 3rd party provider hosts applications and make them available to customers over the internet. It removes the need for businesses to install and run applications on their own data centers or computers. It also eliminates the expense of hardware acquisition and maintenance, as well as software installation and support.
7 0
3 years ago
Read 2 more answers
How to shutdown a computer by step by step​
Reptile [31]

<u><em> </em></u>Answer:

1) Press Ctrl + Alt + Del

2) Click the power button in the bottom-right corner of the screen.

3) From the desktop, press Alt + F4 to get the Shut Down Windows screen.

and that's how to shut down your computer

<u><em></em></u>

<u><em>Please mark as brainliest if answer is right</em></u>

Have a great day, be safe and healthy  

Thank u  

XD  

7 0
2 years ago
Read 2 more answers
Write a program that will add up the series of numbers: 99,98, 97...3.2.1. The program should print the running total as well as
Gekata [30.6K]

Answer:

result = 0

for i in range(99, 0, -1):

   result += i

   print(result)

Explanation:

7 0
3 years ago
When you connect a new hardware device to your computer, the operating system uses a feature called _______ so you can use the n
dalvyx [7]

Answer: Plug and play

Explanation:

Adding a new hardware to the computer activate the plug and play module of the operating system which installs the hardware device into the computer and enables us to use it immediately.

6 0
2 years ago
Other questions:
  • Tower defense is included under which genre of game
    15·2 answers
  • Which string method counts the number of characters in a string?
    5·1 answer
  • Într-o curte sunt G găini și O oi. Să se determine numărul de capete și numărul de picioare din curte.
    13·1 answer
  • How do you get free Wifi on your phone without paying
    6·1 answer
  • There is usually a positive side and a negative side to each technology improvement. Select a technology you use every day and c
    5·1 answer
  • Which of the following statements is false? a. InputStream and OutputStream are abstract classes for performing byte-based I/O.
    7·1 answer
  • Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing furt
    10·1 answer
  • Hat is the purpose of the domain name?
    7·2 answers
  • como la ciencia y tecnologia ayudan a reducir la contaminacion del aire que respiramos? Muestra algunos ejemplos
    12·1 answer
  • ____ characterized the period now known a Web 1. 0. Augmented reality
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!