1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8090 [49]
1 year ago
13

The Euclidean algorithm - The Euclidean algorithm provides a wonderful way to calculate the greatest common factor of 2 numbers.

The greatest common factor, which is the largest number that divides evenly into 1 or more numbers, is useful for reducing fractions. The Euclidean algorithm works by dividing 1 number by the other and finding the remainder. The 2 numbers are redefined, and then the process is repeated. The process ends when the remainder is equal to 0. Following is the pseudo code for the algorithm. In c++ Use 145 and 87 to test your program. The program will find the largest common factor of the numbers (the answer should be 29).
​
Computers and Technology
1 answer:
Murljashka [212]1 year ago
4 0

The pseudo-code of the algorithm will be:

Start

Set n1 equal to 145 and n2 equal to 87.

Divide n1 by n2 and find the remainder.

Set n1 equal to n2 and n2 equal to the remainder.

Repeat steps 2 and 3 until the remainder is equal to 0.

The greatest common factor is n1.

End

What do you mean by pseudocode?

In computer science, pseudocode is indeed a plain language description of a steps in an algorithm or similar system. Pseudocode frequently employs structural patterns of a conventional programming language, although it is designed for human interpretation rather than machine reading. It generally omits features necessary for computation of the algorithm, including such variable declarations and language-specific code. When possible, the programming language is supplemented by natural language description details or succinct mathematical notation.

To learn more about pseudocode

brainly.com/question/24735155

#SPJ9

You might be interested in
A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.
ad-work [718]

Answer:

encryption

Explanation:

A(n) encryption   virus runs a program that searches for common types of data files, compresses them, and makes them unusable.

5 0
3 years ago
Keyshia adds shapes with text to show the steps involved in taking the temperature of a liquid in a laboratory. She
kow [346]

Answer:

1. go to the view tab

2. guides

3. format shape pane

Explanation:

5 0
2 years ago
A _ fire extinguisher should be used on a computer fire
Kipish [7]
Class C. <span>Class C </span>fires<span> are contained using Carbon Dioxide (CO2) </span>fire extinguishers<span> and Dry Chemical </span>fire extinguishers<span>. Sensitive electrical sources or electrical equipment such as </span>computers<span>, T.V's, or wireless devices affected by </span>fire<span> may have residue left once the </span>fire<span> has been deterred.</span>
5 0
3 years ago
What defines interactive media? The user must play a role in writing the content of the media. The user must do something that d
topjm [15]

Answer:

What Is Interactive Media?

Interactive media is a method of communication in which the program's outputs depend on the user's inputs, and the user's inputs, in turn, affect the program's outputs. Simply put, it refers to the different ways in which people process and share information, or how they communicate with one another. Interactive media allows people to connect with others—whether that's people or organizations—making them active participants in the media they consume

5 0
2 years ago
Read 2 more answers
Which will be one of the approaches of game developers in the future?
attashe74 [19]
Probably quantum mechanics
8 0
3 years ago
Read 2 more answers
Other questions:
  • This measures how close a biometric reading is to a prerecorded template
    11·1 answer
  • 5. Drawing Conclusions If you were a person in
    10·1 answer
  • Where is permanent data in the computer stored? Whenever Jim starts his laptop, he sees some commands and numbers appearing on h
    6·1 answer
  • What can you do to manually exclude an individual from a recipient list?
    6·1 answer
  • What is one step taken when solving a computer software problem?
    6·2 answers
  • Which of the following correctly describes a work in the public domain?
    12·1 answer
  • Create an application that determines the final cost of food items and non-food items, assuming only non-food items are taxed. T
    8·1 answer
  • What are some best practices for file management
    8·1 answer
  • What is the optimal number of members for an Agile team?
    10·1 answer
  • 3.2.3 What major al able to do? 3.2.4 What major advantage would Printer X have for Tembi who want documents printed? 3.3 If Tem
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!