1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
3 years ago
5

At the moment i am tackling the cs50x projects and i need a little bit of help with problem set 1, the 'greedy algorithm'. I am

unsure why my program doesn't work. Can you please help me troubleshoot? My program is attached: The answer to the attached terminal pic is supposed to be 4.

Computers and Technology
1 answer:
mars1129 [50]3 years ago
6 0
That you have to multiply first and then divide
You might be interested in
Select the correct answer.
WINSTONCH [101]

i think its B) Theme

7 0
3 years ago
Which of these is not a type of socket?/computer wise
d1i1m1o1n [39]

Many sockets have existed throughout history but only three are relevant today. These are LGA, PGA and BGA.

8 0
3 years ago
What is meant by editing a document​
Doss [256]

Answer: “Editing” in general means fixing problems in a written document so that it has no mistakes and is easy to read

Explanation: Yeah

5 0
2 years ago
Read 2 more answers
Your mothers date of birth and a unique personal identification number (pin) code provide authentication by _____.
Semenov [28]
Hello <span>Madysonhenders2477 </span><span>

Answer: Your mothers date of birth and a unique personal identification number (pin) code provide authentication by What you are (C)

Since your identification is about who you are, this would be the answer.

Hope This Helps!
-Chris</span>
6 0
3 years ago
Document templates are available online.<br> True<br> False
k0ka [10]
True anything is available online.
6 0
3 years ago
Read 2 more answers
Other questions:
  • "the file that specifies how netbeans builds and deploys the application when you run the application is called the ____________
    8·1 answer
  • The CPU is referred to as the ______ of the computer.
    14·2 answers
  • Write a Java program that prompts the user to enter a sequence of non-negative numbers (0 or more), storing them in an ArrayList
    5·1 answer
  • The destructor automatically executes when the class object goes out of ____.
    12·1 answer
  • ________ is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Intern
    12·1 answer
  • sharon gives a thumbs-up to her little brother who has just scored in his schools basketball game. sharon is communicating by us
    5·2 answers
  • Please describe in a few sentences
    14·1 answer
  • A(n) ____ consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to pe
    6·1 answer
  • Briefly explain specialisation?​
    11·1 answer
  • scheduling is approximated by predicting the next CPU burst with an exponential average of the measured lengths of previous CPU
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!