1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adoni [48]
3 years ago
5

Which of the following are examples of algorithms? Choose all that apply.

Computers and Technology
2 answers:
Natali5045456 [20]3 years ago
4 0

Answer:

Explanation:

is a finite sequence of well-defined, computer-implementable instructions, typically to solve a class of problems or to perform a computation. Algorithms are always unambiguous and are used as specifications for performing calculations, data processing, automated reasoning, and other tasks.

klasskru [66]3 years ago
3 0

Answer:

steps to a recipe

steps to balance a checking account

step-by-step directions to a location

step-by-step instructions to assemble a new entertainment center

Explanation:

just answered it;)

You might be interested in
I need help please!!!!
MissTica
Just restart it and it will be fixed
5 0
3 years ago
Read 2 more answers
30 Points!!
Tresset [83]

Answer:

<em>All About The Space. Since many websites use certain image formats to save space and bandwidth, different types of files are used. the most widely used on sites are JPG (JPEG) or GIF images. These are done to save space. And in some cases certain sizes may stretch the image/photo to where it looks silly or bad, that's why there are also small versions.</em>

Explanation:

Different sizes for different occasions

-Hope This Helps!

5 0
3 years ago
Read 2 more answers
Someone once observed that "the difference between roles and groups is that a user can shift into and out of roles, whereas that
mestny [16]

Answer:

All things considered newgrp has nothing to do with security jobs.  

newgrp sets the procedures bunch id which is in many frameworks are irrelevant. All gatherings are accessible. Gatherings are characterized as assortment of clients , bunch get to is conceded to documents dependent on the record gathering.  

Regularly (setgroups/getgroups ) all gatherings are in the process get to list.  

The authorization at a document or registry level has a 3 level arrangement of consents, for example, client proprietorship , bunch possession and others. All things considered the document authorization are a mix of read , compose and execute .we need both peruse and execute consent to run a program.  

A procedure may get to the document if a record has a place with the user(the proprietor of the document ) or if the gathering identifier coordinate on the gatherings in the clients bunches list. That entrance is constrained by the relating consents signals on the record.  

Gatherings have been over-burden with some "job" definitions. In any case, these are just over-burden and not a decent utilization of groups,the utilization of a gathering as a job was bolstered by the setgroup id banner , and by utilities like a sudo , where gathering name likewise coordinates a security control. It expect that the gathering name isn't utilized for documents yet once a client is in the gathering that client can apply the gathering to a record regardless of whether it isn't what the gathering was for.  

This over-burden use worked where frameworks didn't bolster genuine jobs. The over-burden utilize was only a work around.  

Linux has genuine job definition bolstered by SELinux models and can be applied to documents , clients , and forms.

7 0
4 years ago
Which of the following occurs during data cleansing?
Diano4ka-milaya [45]

Answer:c)Clean redundant customer data

Explanation:Data cleansing/cleaning is the activity for the elimination of the data which is not required for further use, corrupt, unnecessary etc by detecting it. The data that is being cleared is categorized by levels like irrelevant  data, incorrect data, inaccurate data, redundant data etc.

The data is eliminated by the method of correcting , modifying, reducing unnecessary parts,deleting, etc.Thus, the correct option is option(C).

5 0
4 years ago
Conflict on cross-cultural teams
mars1129 [50]

Answer:

A : is inevitable and should just be ignored until it blows over

Explanation:

Hopefully this helps!

3 0
3 years ago
Read 2 more answers
Other questions:
  • Write about the future of Reliability and Security in Software Engineering.
    13·1 answer
  • A group of computers that are interconnected in order to share information or documents is called a _____
    9·1 answer
  • A comma is also called a statement terminator. A. True B. False
    8·1 answer
  • In what way can parents use technology in their children’s development?
    11·2 answers
  • Which statement describes part of the meeting scheduling process? It is always an all-day event. It is created in a single calen
    14·1 answer
  • Word-processing,spreadsheets, databases, and desktop publishing are all types of _______?
    12·2 answers
  • Please help!!! I am very confused about this question!
    10·1 answer
  • Who is responsible for developing the physical background for the characters by creating buildings, landscapes, and interiors?
    14·1 answer
  • What are the components of a web page???
    9·2 answers
  • To improve readability and maintainability, you should declare ________ instead of using literal values such as 3.14159.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!