1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Akimi4 [234]
3 years ago
13

Does giving a set instructions to someone, or a recipe for a cake represent an algorithm?

Computers and Technology
1 answer:
prohojiy [21]3 years ago
4 0
I dont know sorry if i wasted this answer
You might be interested in
The internet maybe best compared to what
attashe74 [19]
The internet can be compared to many stuff, such as a world wide web, or a huge box with stuff and you put in what you want and it comes out! 
6 0
3 years ago
In regard to segmentation, all of the following are examples of a customer's behavior or relationship with a product EXCEPT: a)
scZoUnD [109]

Answer: demographics

Explanation:

Market segmentation refers to the process of dividing the consumers into sub-groups of consumers which are refered to as the segments based on the characteristics shared.

The examples of a customer's behavior or relationship with a product include user status, usage rate and loyalty status.

It should be noted that some examples of market segmentation are behavioral, demographic, geographic, and psychographic. From the options given, demographics is not an example of a customer's behavior with a product.

7 0
2 years ago
Which of the following is true of how packets are sent through the Internet?
astra-53 [7]

Answer:

It is A: Packet metadata is used to route and reassemble information travelling  through the internet.

Explanation:

Step 1: The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops. Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee

Step 2: Entering the network

Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee.

Step 3: Taking flight

The next hop delivers the packet to a long-haul provider, one of the airlines of cyberspace that quickly carrying data across the world.

Step 4: BGP

These providers use the Border Gateway Protocol to find a route across the many individual networks that together form the Internet.

Step 5: Finding a route

This journey often takes several more hops, which are plotted out one by one as the data packet moves across the Internet.

Step 6: Bad information

For the system to work properly, the BGP information shared among routers cannot contain lies or errors that might cause a packet to go off track – or get lost altogether.

Last step: Arrival

The final hop takes a packet to the recipient, which reassembles all of the packets into a coherent message. A separate message goes back through the network confirming successful delivery.

8 0
3 years ago
Read 2 more answers
PC’s & More has shifted to sales and service of laptops and PCs, where it has the potential to triple the number of its cust
photoshop1234 [79]

Answer:

Growth Strategy

Explanation:

A growth strategy is a plan of action that allows you to achieve a higher level of market share than you currently have. Such as the case in the question, PC's shifted so sales and service of Laptops and PCs because there is a greater market share for them there than where they currently operate from.

5 0
3 years ago
Select the correct answer. Matt works for an advertising agency. He is often involved in the designing and development processes
Rus_ich [418]

Answer:

MAY BE A

Explanation:

I THINK A IS THE CORRECT ANSWER

8 0
3 years ago
Read 2 more answers
Other questions:
  • The word computer consists of 64 bits, which is equivalent to _____ bytes.
    5·1 answer
  • When a user inserts a PivotTable, where will it be inserted?
    15·1 answer
  • What would be the best engine to use for making a 3d beginner game
    9·1 answer
  • Beth would like to run an nmap scan against all of the systems on her organization's private network. These include systems in t
    15·1 answer
  • Select the tips you should follow when writing a business report.
    12·1 answer
  • Does anyone know a good reason WHY to change your username.
    5·1 answer
  • I will give Brainliest and Extra points for correct answers!!!
    13·2 answers
  • Examples of email prividers​
    6·2 answers
  • Jackie is planning a surprise birthday party for her best friend and is researching a location to have the party. Jackie found a
    6·1 answer
  • A _____ standard describes the requirements for obtaining a domain name for use by external parties?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!