1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
4 years ago
14

What is an algorithm, and what areits main characteristics?

Computers and Technology
1 answer:
vivado [14]4 years ago
8 0

Answer:Algorithm is a step-vise instructions that form a procedure to solve a particular problem. Characteristics of algorithm are:-

  • Input
  • output
  • Finite instructions
  • Effectiveness

Explanation: Algorithm is the step by step instructions that are present to give the desired output by giving the proper input instructions.There are many characteristics of a good algorithm. Some of the major characteristics are as follows:-

  • Input-the input should be given in proper steps to get the desired output
  • Output-the output is usually is one or more which is derived from the input instructions.
  • Finite instructions-it is desired that the given instruction should be in a finite number of steps.
  • Effectiveness- it is expected that the algorithm should be in basic form and effective enough to be understood easily.

You might be interested in
The vertical and horizontal scroll bars can be used to aid in navigation throughout the document. true or false
Triss [41]

Answer: True

Hope this helps :)

7 0
3 years ago
Read 2 more answers
Write a C program to calculate and display the coordinates of midpoint - M of a linesegment between two given points - say A and
pychu [463]

Answer:

//Program in C.

// header file

#include <stdio.h>

#include <math.h>

// main function

int main(void) {

   // variables

float x1,y1,x2,y2;

float s,xm,ym,d;

// ask to enter x coordinate of A

printf("Enter coordinate (x) of point A:");

// read x1

scanf("%f",&x1);

// ask to enter y coordinate of A

printf("Enter coordinate (y)  of point A:");

// read y1

scanf("%f",&y1);

// ask to enter x coordinate of B

printf("Enter coordinate (x) of point B:");

//read x2

scanf("%f",&x2);

// ask to enter y coordinate of B

printf("Enter coordinate (y) of point B:");

// read y2

scanf("%f",&y2);

// calculate Midpoint of A and B

xm=(x1+x2)/2;

ym=(y1+y2)/2;

// calculate slope of the line

s=(y2-y1)/(x2-x1);

// calculate Distance between two points

d=sqrt(((x2-x1)*(x2-x1))+((y2-y1)*(y2-y1)));

// print result

printf("Midpoint of both the point is: %f %f",xm,ym);

printf("\nSlope of both the line is: %f",s);

printf("\nDistance between both the point is: %f",d);

return 0;

}

Explanation:

Read the x & y coordinates of both the points.Then calculate the Midpoint of both the and assign it to variables "xm"&"ym".Then calculate the slope of the line and assign it to variable "s".Then find the distance between the two points and assign it to variable "d".Print all these results.

Output:

Enter coordinate (x) of point A:2

Enter coordinate (y) of point A:3

Enter coordinate (x) of point B:9

Enter coordinate (y) of point B:8

Midpoint of both the point is: 5.500000 5.500000

Slope of both the line is: 0.714286

Distance between both the point is: 8.602325

6 0
3 years ago
Mohammed's parents learn that his classmates have
n200080 [17]

FULL PROBLEM:

Mohammed’s parents learn that his classmates have begun sending him text messages making fun of his heritage. Mohammed says he’s fine because they are just teasing him.

Which challenge is making it difficult to stop the cyberbullying of Mohammed?

A.  The classmates are using secure computers.

B.  The classmates are using technology positively.

C.  Mohammed doesn’t have any evidence of the cyberbullying.

D.  Mohammed doesn’t believe the cyberbullying exists.

ANSWER:

D.  Mohammed doesn’t believe the cyberbullying exists.

3 0
3 years ago
Read 2 more answers
Technology that verifies a person's identity is _____. a smart card Automated Fingerprint Verification an EPD a digital ink pen
tresset_1 [31]
The answer is Automated fingerprint.
 Automated Fingerprint is the process that verifies a person's identity. It is primarily used for law enforcement agencies for criminal identification initiatives. It is important because it includes identifying a person suspected of committing a crime or linking suspects to unsolved crimes. 

3 0
3 years ago
Read 2 more answers
HELP!!!!!!!! my keyboard keeps acting up every time I press a random key on my keyboard when it stops working it works perfectly
iogann1982 [59]

Answer:

try unplugging it and replugging it in, make sure your keyboard is clean, that there aren't any crumbs underneath the keys.

they using it on a different device and see if it does the same thing.

Explanation:

5 0
3 years ago
Other questions:
  • Which cloud computing service model gives software developers access to multiple operating systems for testing?
    5·1 answer
  • What is a good monitor for console gaming? (Any price)
    13·2 answers
  • The Warn-on-Forecast has been developed by the National Weather Service to help predict hazardous weather earlier. Which of the
    10·2 answers
  • What is grid computing? It is distributed computing where autonomous computers perform independent tasks. It is interconnected c
    12·1 answer
  • What technical elements can a film director manipulate to achieve the final product, conveying his ideology and vision?
    11·1 answer
  • ZeroIt is a function that takes one argument and returns no value. The argument is a pointer to int. The function stores the val
    15·1 answer
  • Place the steps in order to keep a graphic from spilling over into the next page and to include the text it is assciated with.
    12·1 answer
  • What happen if file server stops working?
    5·1 answer
  • Why is it important to prevent financial loss
    7·1 answer
  • General Electric saves $1.6 billion per year by using its private corporate network that links its 340,000 employees. Another na
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!