1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
3 years ago
5

How do you create a algorithm?

Computers and Technology
2 answers:
aksik [14]3 years ago
6 0
Make sure that each box has an arrow going to it or leading from it, if it needs one. Select “Insert,” then “Shapes,” and choose the Text Box option: Page 2 [Algorithm how-to procedure] 2 Drag the cursor across the document to customize the size of the text box. Click inside the box to begin typing.
brainliest pls
Margaret [11]3 years ago
3 0
<span>As you know, an algorithm is the logical steps you follow to solve a problem, so “creating an algorithm” is a problem itself, doesn’t it ? so it also needs an algorithm to be solved.As long as you want to create an algorithm, so I assume that you are facing a problem X and you want to create an algorithm to solve it, so here is my algorithm (I really did this steps while I was researching):<span><span>Problem Definition Phase: Know all the phases of the problem, as far as you can, to do this, you need to search what is X, learn about it, learn more and more about your enemy (the problem).</span><span>Last Solutions Phase: in the last phase you searched for “what is X”, now we will search for “what are the possible solutions for X”, we will search for that in order to know, what did great people do so far, search alot, read papers, search for conferences, collect as many solutions and as newest solutions as you can, study them will, compare them, understand them.</span><span>The Fork Phase: now, you had learnt about the problem and its most recently solutions, ask your self, do you think “I need” or “I can” make better ? if you can be satisfied with one of the most recently developed solutions, then we are done, if not continue.</span><span>Archimedes Eureka Phase: this is the last and longest phase, here, you need to start thinking about a solution wich is faster than or better than the others, you may use one of them also and complete it, or you may use it as a reference, but this phase really don’t have a typical way to go through it, as you know, Archimedes had discovered the floating principle just by chance, the same lot of inventions and discoveries, you just have you, yourself, your mind, the nature and the luck to invent the algorithm wich is the last phase in the algorithm of creating your algorithm.</span></span>Note: these names of phases I had just created it now, it’s not a world wide or global concepts, I just try to KISS(keep things simple stupid).</span>
You might be interested in
I need help solving this problem on Picoctf. The question is What happens if you have a small exponent? There is a twist though,
soldi70 [24.7K]

Explanation:

Explanation:

RSA encryption is performed by calculating C=M^e(mod n).

However, if n is much larger than e (as is the case here), and if the message is not too long (i.e. small M), then M^e(mod n) == M^e and therefore M can be found by calculating the e-th root of C.

5 0
3 years ago
PLEASE HELP!!! What are the benefits of online notebooks? Check all that apply.
Kipish [7]

They allow users to store files.

They allow users to share files.

They help users organize assignments.

They allow users to clip information from web pages.

4 0
3 years ago
Read 2 more answers
An _____provider is a business that provides individuals and companies access to the internet for free
boyakko [2]

Answer:A B

access provider Business that provides individuals and companies access to the Internet free or for a fee.

Explanation:

6 0
3 years ago
Read 2 more answers
Directions: Give the shortcut key for the following commands: 1. Open 2. Save 3. New document 4. Copy 5. Undo 6. Redo 7. Paste 8
stepan [7]

Answer:

Explanation:

1 : Ctrl + X

2 Ctrl + C

3 Ctrl + L

4 Ctrl + V

5 Ctrl + B

6 Ctrl + R

7 Ctrl + I

8 Ctrl + E

9 Ctrl + U

10 Ctrl + Z

11 Ctrl + Y

12 Ctrl + N

End

13 Ctrl + A

Home

14 Ctrl + J

15 Ctrl + 2

16 Ctrl + S

17 Ctrl + 1

18 F12

19 Ctrl + W

-----------

20 Ctrl + K

21 Ctrl + ]

22 Ctrl + (left arrow)

23 Ctrl + (right arrow)

24 Ctrl + [

25 Ctrl + Del

26 Ctrl + 5

27 F1                                                         pls mark me as brainliest and              

                                                                   check all the short cuts

8 0
3 years ago
in this third journal assignment, you will think about your work as the product tester for the travel booking software and how y
Temka [501]

My early test cases were greatly aided by the user stories. They gave a thorough summary of what a user can expect from the product as well as data on their past expectations and experiences.

Explanation:

The intricacies of the user's surroundings and the exact technological needs for the product, however, were absent from the user stories.

Greetings, Software Developers!

I'm trying to create more in-depth test cases for my job as a quality test for the online travel software. To do this, I'd like to learn more about the environment of the user and the software's technical requirements. Please give me more details about the technical specs and the user environment.

I'm grateful.

[Name]

To know more about testing
brainly.com/question/22710306
#SPJ4

3 0
1 year ago
Other questions:
  • Write a recursive method public static String reverse(String str) that computes the reverse of a string. For example, reverse("f
    6·1 answer
  • An idea concerning what will happen in the future. (Crossword)
    9·1 answer
  • Which of the following is true regarding packaged software and custom software? Group of answer choices Packaged software are ap
    13·1 answer
  • is this statement true or false ? satelite and remote sensing devices have helped cartographers make more accurate maps with spe
    12·1 answer
  • You are the network administrator for Slimjim, a peripheral device company. The network uses Linux, and you need information on
    10·1 answer
  • Consider the following scenario below and recommend a solution.
    8·1 answer
  • Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
    13·1 answer
  • Please help!!!! will mark brainliest!!
    7·2 answers
  • The use of a concept or product from one technology to solve a problem in an unrelated one
    11·1 answer
  • In a program you need to store identification numbers of 5 employees and their weekly gross pay.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!