1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katyanochek1 [597]
4 years ago
10

An algorithm is defined as a well-ordered collection of unambiguous and effectively computable operations that when executed pro

duce a result and halt in a finite amount of time. In one sentence or less, what does it mean to be effectively computable
Computers and Technology
1 answer:
Elodia [21]4 years ago
8 0

Answer:

to be effectively computable, the person is definite, explicit and 'mechanical'.

You might be interested in
The processor itself is not a resource, therefore the OS is not involved in deciding how much of the processor time is used for
photoshop1234 [79]

Answer:

False

Explanation:

In computing, a resource can be defined as a component with limited or varying size/capability. Every computer has a processor whose capability is measured by the number of instructions it can perform in a given unit of time (Clock speed), The number of cores, the size of cache memory and of course the make i.e. AMD or Intel.

One of the functions of the Operating systems in relation to CPU is CPU Scheduling. This is whereby the process manager determines the process to be allocated the resource (CPU) basing on the suitable criteria.

The scheduling criteria is based on:

a. CPU Utilization ensures that the CPU is busy all the time.

b. Throughput is the number of processes that can be executed per unit given time.  

c. Turn Around Time which is the time it takes to get the final output after the process has been allocated the CPU.

d. Waiting Time defined as the length of time a process takes in the ready queue.

e. Response Time defined as the difference in time between the arrival time and the time it starts executing.

The algorithms selected aims at:

1. Maximize CPU utilization

2. Maximize throughput

3. Minimize Turn Around Time, Waiting Time and Response Time

The operating system uses the scheduling criteria to determine the best algorithm to be used to give a number of processes.

These algorithms can be grouped as either preemptive or non-preemptive.

Preemptive means once the process has been allocated to the CPU and can be interrupted before it completes its burst time. Examples include:

a. Round Robin

b. Shortest Remaining Time First (SRTF)

c. Priority Scheduling

Non-preemptive scheduling algorithm works in a way that once a process has been allocated the CPU it cannot be halted or paused until it has completed its burst time. Examples include:

a. First Come First Serve (FCFS)

b. Shortest Job First (SJF)

c. Priority Scheduling

7 0
3 years ago
Read 2 more answers
Read two numbers from user input. Then, print the sum of those numbers. Hint - Copy/paste the following code, then just type cod
Dmitriy789 [7]

Answer:

The full program is:

<em>num1 = int(input()) </em>

<em>num2 = int(input()) </em>

<em>print(num1 + num2)</em>

<em />

Explanation:

Given

<em>num1 = int(input()) </em>

<em>num2 = ?</em>

<em>print(num1 + ?)</em>

<em />

Required

Replace ? with the right codes

Line 1: The syntax is correct

Line 2: The ? should be replaced with an integer input function to get input for num2.

So, the second line would be: <em>num2 = int(input()) </em>

Line 3: The ? should be replaced with num2 in order to calculate and print the required sum.

So, the third line would be: <em>print(num1 + num2)</em>

<em />

8 0
3 years ago
Which statement about digital certificates is​ FALSE? A. The CA verifies a digital certificate​ user's identity online. B. Digit
liq [111]

Answer:

A

Explanation:

chicken

7 0
3 years ago
What is the Matlab command to create a vector of the even whole numbers between 29 and 73?
Nana76 [90]

Answer:

x = 29:73;

x_even = x(2:2:end);

Explanation:

In order to create a vector in Matlab you can use colon notation:

x = j:k

where <em>j</em> is 29 and <em>k</em> is 73 in your case:

x = 29:73

Then you can extract the even numbers by extracting the numbers with even index (2,4,6,etc.) of your vector:

x_even = x(2:2:end);

In the line of code above, we define <em>x_even</em> as all the elements of x with even index from index 2 till the end index of your vector, and an increment of 2 in the index: 2,4,6,etc.

If you want the odd numbers, just use the odd indices of your vector:

x_odd = x(1:2:end);

where <em>x_odd</em> contains all the elements of <em>x</em> with odd index from index 1 till the end index, and an increment of 2: 1,3,5,etc.

6 0
3 years ago
You have a friend that says she is interested in going into web development. She is very knowledgeable in terms of technology an
Schach [20]

Answer:

She should be aware several social media spectators are going to watch her content. She will get exposed on the Internet.

Explanation:

She should be aware several social media spectators are going to watch her content. She will get exposed on the Internet.

She should think before saying anything as one of his fans may complaint about her content to the police if she makes a joke about shooting up a place.

She has to be careful with his words as this may lead to termination from the job.

4 0
3 years ago
Other questions:
  • Elsa has collated information for a meeting using Excel. Due to certain developments, some of the data in her worksheet is now r
    6·1 answer
  • Deleting a footnote or endnote reference mark in a document only deletes the reference mark but not the actual footnote or endno
    14·1 answer
  • ​​most code division multiple access (cdma) networks conform to ____________ , created by the telecommunications industry associ
    10·1 answer
  • In an airline reservation system, on entering the flight number, the flight schedule and the flight status are displayed. In thi
    13·2 answers
  • Create a script that will find the sum of the all multiples of 3 between 1 and 1000 by using For Loop. (Pseudo Code required) 3.
    7·1 answer
  • A technician attempts to run an executable file on a Linux computer but receives a Permission Denied message.
    11·1 answer
  • Tom installs a Telnet application on his Windows Vista system. When he first starts the program, Windows Firewall pops up with a
    10·1 answer
  • What type of program installs and gathers personal information, including password and account information, from a computer with
    9·1 answer
  • Which of the following can technology NOT do?
    12·1 answer
  • What would you need to do if you wanted a computer to always look for a bootable CD before looking to the local hard drive
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!