1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vazorg [7]
3 years ago
14

.An algorithm specifies the actions to be executed. True False

Computers and Technology
1 answer:
steposvetlana [31]3 years ago
3 0

Answer:

True.

Explanation:

An algorithm for a problem provides the set of instructions that are required to solve a problem.It does not provide the full code.It is like an abstract solution of a problem.It is just like a recipe for cooking a dish.It will not cook food for you but can tell you how to cook.

Since it provides the action to be executed hence the answer is True.

You might be interested in
Top/Bottom Rules allow a user to apply conditional formatting to cells that fall within the top or bottom numbers or percentile.
vfiekz [6]

The numbers of  items that the user can include in the rule is the top or bottom 100 items only.

<h3>What is Top/Bottom Rules?</h3>

Top/Bottom Rules is known to be a rule where there is a premade form of conditional formatting which is often used in Excel to alter the set up  of cells in a range.

Note that the Top/Bottom Rules will allow a user to make changes to the top or bottom 100 items only as it only pertains to things that are up and those that are at the bottom.

Learn more about Top/Bottom Rules from

brainly.com/question/1862654

7 0
2 years ago
5. What is a domain name used for?​
Mnenie [13.5K]

<u>Answer:</u>

Domain names serve to identify Internet resources, such as computers, networks, and services, with a text-based label that is easier to memorize than the numerical addresses used in the Internet protocols. A domain name may represent entire collections of such resources or individual instances.

<u />

<u>Explanation:</u>

*Hope this helps*

7 0
3 years ago
provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,
Oxana [17]

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

3 0
3 years ago
What is storage unit in computer and five examples of storage units.<br>​
Juliette [100K]

Answer:

the storage unit of a computer is known as the term which is used to indicate storage capacity.

Explanation:

Five units of storage units are:-

1) byte

2) kilobyte

3) megabyte

4) gigabyte

5) terabyte

7 0
3 years ago
Read 2 more answers
How do you change the order of the slides in your presentation within the outline pane? Drag icon up or down Delete slide icon C
Amiraneli [1.4K]

Answer:

Rearrange the order of slides

In the pane on the left, click the thumbnail of the slide that you want to move, and then drag it to the new location. Tip: To select multiple slides, press and hold Ctrl while you click each slide that you want to move, and then drag them as a group to the new location.

Explanation:

7 0
3 years ago
Other questions:
  • TRUE/FALSE: In order to use an object in a program, its class must be defined.
    10·1 answer
  • How does scarcity affect what gets produced
    5·1 answer
  • Which type of hypervisor does not run on an underlying operating system?
    13·1 answer
  • It is an attribute that must be used in the form tag in specifying an input file type
    9·1 answer
  • To do a good job of searching periodicals at your library, you should use A) the Library of Congress Authorities webpage. B) web
    10·1 answer
  • The Windows Remote Desktop Web connection that allows users to connect to a work or home computer and access files is considered
    7·2 answers
  • What electronic device can represent a KiloByte?
    14·1 answer
  • The Company should use BLANK cables to provide Fast connectivity without electrical interference
    6·1 answer
  • What tasks should a laptop accomplish?
    15·1 answer
  • Choose all of the items that represent functions of an operating system.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!