1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katyanochek1 [597]
3 years ago
5

Pseudocode for mystry algorithm

Computers and Technology
1 answer:
kari74 [83]3 years ago
8 0

Answer:

Initially if x = a = 2437 and y = 875,  condition (1) that is x>y is true and output would be x = 1562 with y = 87

Explanation:

According to pseudo code the code will run until x becomes equal to y. Initially if x = a = 2437 and y = 875,  condition (1) that is x>y is true. So next step would be x=x-y and output would be x = 1562 with y = 875. With initial values x = a = 2437 and y = 875, x becomes equal to y after 21 iterations and output is x=y=1

                 X        Y

  1.      2437         875
  2.      1562         875
  3.       687          875
  4.       687          188
  5.       499          188
  6.       311            188
  7.       123           188
  8.       123           65
  9.       58            65
  10.       58             7
  11.       51              7
  12.       44             7
  13.       37             7
  14.       30             7
  15.       23             7
  16.       16              7
  17.        9              7
  18.        2              7
  19.        2              5
  20.        2              3
  21.        2              1
  22.        1               1
You might be interested in
In a non-price rationing system, consumers receive goods and services first-come, first served. Give me an example of a time whe
Anna35 [415]

When someone may be giving away something for free.

7 0
2 years ago
Part of implementing Ken 7 Windows Limited new enterprise resource planning (ERP) software is ensuring all workstations and serv
spayn [35]

Answer:

Explanation:

1) The Functions a software application provide to keep a web browser secured includes:

a) The web browser should always be updated, you can keep it on "automatic update" option enable on your browser settings so that it will be automatically updated whenever the browser gets an update.

b) Always keep the third party cookies disabled because of the many unauthorized and phishing sites over the internet. This leaves the browser unsafe and cause higher security risk so block all the third party sites and cookies from the browser.

2) The Functions a software application prohibit to keep a web browser secured includes:

a) Do not store passwords on your web browser, deny the "store password" option on your browser settings. This is very important Even if you store passwords on your web browser do set a very strong master password to access all the stored passwords.

b) Don't ever click on unwanted and unknown hyperlinks. There will be many unsolicited attachments, files, etc over the internet please do not open or download it unnecessarily.

3) The functions a software application should provide to keep a web server secured includes:

a) Always using an application scanner. Whenever you install or download any new applications, scan the application before accessing it or opening it.

b) Install all the security patches to keep off hackers as they are many on the internet.

4) The Functions a software application should prohibit to keep a web server secured includes:

1) Uninstall an application that has not been used for long time, because they are actually of no use.

b) There may be scripts, files, setups, codes stored on the web server unknowingly so do check it and delete all the sample scripts, files and codes from the web server.

3 0
3 years ago
in this third journal assignment, you will think about your work as the product tester for the travel booking software and how y
Temka [501]

My early test cases were greatly aided by the user stories. They gave a thorough summary of what a user can expect from the product as well as data on their past expectations and experiences.

Explanation:

The intricacies of the user's surroundings and the exact technological needs for the product, however, were absent from the user stories.

Greetings, Software Developers!

I'm trying to create more in-depth test cases for my job as a quality test for the online travel software. To do this, I'd like to learn more about the environment of the user and the software's technical requirements. Please give me more details about the technical specs and the user environment.

I'm grateful.

[Name]

To know more about testing
brainly.com/question/22710306
#SPJ4

3 0
1 year ago
PLEASE HELP ASAP!!!!!!!!!! WILL GIVE A BRAINLIEST!!!!!!
sattari [20]
The answer to this question is:

"Both work with computers, but only Bluetooth can be used in a headset"

The answer to this is true because Both computers can use/work with computer but Bluetooth can only connect to head set headset don't need wifi it needs Bluetooth and charging/plug

Your Welcome :)
5 0
3 years ago
Read 2 more answers
______ is a modem standard that uses Lempel-Ziv encoding to compress data. V.22 V.44 V.32bis V.34 RS 232
tester [92]

Answer:

V44 uses Lempel-Ziv-Welch encoding to compress data.

Explanation:

Lempel–Ziv (LZW) created by Abraham Lempel and Jacob Ziv is a universal lossless data compression algorithm. It is an improvement of LZW algorithm.

It makes use of LZ78 algorithms. This algorithm achieve its compression by taking out repeated occurrences of data with references to a dictionary that is built based on the data stream it received as input.

Also, its dictionary pre-initialized with all available possible characters and symbols.

6 0
3 years ago
Other questions:
  • How do I connect my CSS file and HTML page together? it's just not wanting to work for me. 
    5·1 answer
  • 80% OF QUESTIONS ARE ANSWERED IN UNDER 10 MINUTES why not mine
    15·2 answers
  • With network management software, a network manager can ____.
    6·1 answer
  • What operating system type uses icons to represent programs
    9·2 answers
  • What does intergrated organization mean
    15·1 answer
  • . Suppose that name is a variable of type string. Write the input statement to read and store the input Brenda Clinton in name
    5·1 answer
  • What are attribute grammars used for?
    8·1 answer
  • write a program with total change amount as an integer input and output the change using the fewest coins, one coin type per lin
    8·1 answer
  • In C++, objects instantiated on the stack must be returned to program memory through the explicit use of the delete keyword.
    6·1 answer
  • Add me on Fortn!te <br> TsarBacon (imma girl)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!