1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arisa [49]
3 years ago
15

The process of determining that a computer program implements a simulation model as it is intended is known as

Computers and Technology
2 answers:
DIA [1.3K]3 years ago
8 0
<span>the process of determining if a computer program implements a simulation model as it is intended is known as verification.</span>
torisob [31]3 years ago
4 0

<em>The process of determining that a computer program implements a simulation model as it is intended is known as </em><em>computer simulation. </em>

<h2>Further Explanation </h2>

Computer simulations have become a useful part of modeling many natural systems mathematics in physics, chemistry and biology, human systems in economics, psychology, and social sciences and in the process of new engineering technology, to gain insight into the operation of such systems.

Computer simulations build and are useful additions to pure mathematical models in science, technology, and entertainment.

A computer simulation, computer model, or computational model is a computer program, or computer network, which tries to simulate abstract models of a particular system. Computer simulations have become a useful part of modeling natural systems mathematics in many fields in physics (computational physics), astrophysics, chemistry and biology, human systems in economics, psychology, social sciences, and engineering.

<em>Computer models can be classified according to several pairs of independent attributes, including: </em>

  • Stochastic or deterministic (and as a special case of deterministic, chaotic) - see External links below for examples of deterministic vs. stochastic simulations
  • Steady-state or dynamic
  • Continuous or discrete (and as an important special case of discrete, discrete events or DES models)
  • Local or distributed

Learn More

Computer simulation brainly.com/question/3709782

Computer program brainly.com/question/3709782

Details

Class: High School

Subject: Computer and Technology

Keywords: Simulation, Computer, Program

You might be interested in
What symbol precedes all structured references in formula autocomplete lists?
Zolol [24]
Structured references make it easier to use formulas with Excel tables by ... Use brackets around specifiers All table, column, and special item ...
4 0
2 years ago
To create a public key signature, you would use the ______ key.
olya-2409 [2.1K]

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

4 0
3 years ago
In cell e9, enter a formula that calculates the session fee for a member. members receive a member discount off the non-member s
svetoff [14.1K]

If Kevin wants to create a graph to show how his investments and savings accounts have increased over the past year, he should use a spreadsheet. Spreadsheet enables one to see the trend line of the desired outcome by using specific charts.

<span> </span>

6 0
3 years ago
Exchanging which type of data uses the least bandwidth?
Mariulka [41]

Answer:

Voice data uses less bandwidth during exchanging  

Explanation:

The in-network volume of data been transferred between two network points. The data transfer in the network will be heavy and some time it will less.  

It all depends on the end-user data transfers. If end-user transfer media files such as video or bandwidth will be used heavy. If voice data is used then it uses very less.  

Suppose end-user transfer txt file or XML files some it uses very less bandwidth that also depends on file size transfer.

8 0
3 years ago
Ryan is working on the layout of her web page. She needs to figure out where her header, navigation bar, text, and images should
julsineya [31]

This answer really depends on your source as it is different for everybody and there really is not one correct answer. Trust me as a web developer I don't always use the same strategy for every site I tackle. Here are some thoughts. See if any sound familiar to you.

Wire framing

Photoshop or graphic mock-up

Sketching

low -fidelity mock-up

Hope that helps.

6 0
2 years ago
Other questions:
  • 3. If the typical balance on Lucy's credit card is $750 and the interest rate (APR) on her credit card is 16%, how much in inter
    11·2 answers
  • What is the top folder of the file tree called
    5·2 answers
  • You are the CISO of a company and you need to create logging policies. Please review NIST SP800-92, specifically sections 4–3 th
    12·1 answer
  • Project using simple formulas
    15·1 answer
  • Which statistical function in a spreadsheet helps you to see how far each number varies, on average, from the average value of t
    5·1 answer
  • Data stored on physical storage devices must do what before the processor can access it? Be converted to binary Be written to th
    9·1 answer
  • B) The company's chief financial officer recognizes the need for an upgrade to the smart watches, but does not understand why th
    8·1 answer
  • What is game development​
    10·2 answers
  • Why is translator required?​
    11·2 answers
  • One way to protect against a security threat to a computer system is to __________. Avoid external links with inconsistent URLs
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!