1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GalinKa [24]
4 years ago
11

What is a step by step procedure written to carry out a task?

Computers and Technology
1 answer:
alexdok [17]4 years ago
6 0

Answer:

A. Algorithm

Explanation:

A computer uses algorithm (a well-defined procedure ) to solve a problem.

You might be interested in
The activity spikes during black Friday sales in the holiday season but significant stress on a major retailers website what fea
Elza [17]

Answer:

My Nav is the right answer.

Explanation:

Net asset value (NAV) describes a fund's per part exchange value. NAV is calculated by separating the complete value of all the money and securities in a fund's responsibility, minus any mortgages, by the number of exceptional shares. The NAV estimation is necessary because it shows us how much one portion of the fund is worth.

4 0
3 years ago
TCO 10) Voice packets could experience a significant _____ delay in routers and switches when sharing a network with data traffi
bonufazy [111]

This delay in routers is what we called Packetization delay or also called Accumulation delay. Packetization delay is the time required for the information to pass on the wires. The data rate of the links that passes thru the wires cause the delay.

8 0
3 years ago
What defines "print media"? It is media that includes words and text rather than video, such as many blogs. It is media that is
uranmaximum [27]

Answer:

"It is media that is distributed in paper form, such as magazines and newspapers."

3 0
3 years ago
Why does dns use udp instead of tcp? if a dns packet is lost, there is no automatic recovery. what are the consequences?
inysia [295]
<span>If a DNS packet using UDP is lost this problem must be handled at the application layer. If an answer is not received after some period of time the specific application may choose to resend the DNS query. I can go much more into detail but this should answer your question. If you need more detail just ask.</span>
6 0
3 years ago
Which expansion slot is best for high-end dedicated video cards?
Contact [7]

Solution:

It is done Motherboard.

The motherboard includes most of the slots that we'll run into these days. It's a little unusual in that we don't often see motherboards which have both PCI-Express slots and an AGP slot. The best slot to use for video cards is the PCI-Express x16 slot. The next best is the AGP slot. The next best is a PCI-Express x1 slot but video cards which fit that slot are very hard to find as of late 2006. Some low-budget computers are sold with integrated video and have neither PCI-Express x16 slot or an AGP slot.

3 0
3 years ago
Other questions:
  • What limits the impact of vehicle balance on view ghost ability during emergency vehicle maneuvers?
    15·1 answer
  • Changeover means that ____. (select all that apply)
    7·2 answers
  • 6.12 Nested Increments Write a program for spiritual lumberjacks who want to show their appreciation for each tree they 'kill' b
    12·1 answer
  • Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed
    12·1 answer
  • 3) An algorithm has a run time of O(nk ) for some integer k. On an input of size 500, the algorithm takes 16 seconds to run. On
    8·1 answer
  • What is a fragmented disk?
    14·1 answer
  • You are troubleshooting a laptop with multiple sticking keys that result in misspelled words while the user types. Other than se
    10·1 answer
  • PLEASE HELP ASAP!!! 50 POINTS FOR TWO DIGITAL TECHNOLOGY MULTIPLE CHOICE QUESTIONS!!!
    13·1 answer
  • Write a function that simulates the roll of a six-sided dice. The name of the function is rollDice. The function accepts no para
    8·1 answer
  • What should be taken into consideration when determining which critical information should be protected?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!