1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
3 years ago
6

An algorithm is a ________. a. simple thinking strategy for making decisions quickly and efficiently. b. testing method involvin

g trial and error. c. automatic, intuitive judgment. d. methodical step-by-step procedure for solving problems.
Computers and Technology
1 answer:
Vsevolod [243]3 years ago
6 0

Answer:

d. methodical step-by-step procedure for solving problems.

Explanation:

It is a set of instructions or a step-by-step methodological approach or process that helps solve simple or complex problems. Let’s say you want to count the number of people in a hall. You can count them one at a time with your finger and count from 1. You can express this algorithm of counting the number of people in that hall in form of a mathematical or computer pseudo code.

You might be interested in
How to turn off location on iphone without person knowing
andrezito [222]

Answer:

airplane mode

Explanation:

5 0
3 years ago
The photographer for "The Migrant Mother" photograph used _______________, which is a technique that would be considered unethic
d1i1m1o1n [39]

Answer:

The technique used by the photographer which would be considered unethical today is:

Stage Managing

Explanation:

  • The Migrant Mother is a famous that was captured by the photographer named Dorothea Lange. This photograph was taken during the era of great depression that shows the misery of a women as well as her courage.
  • The photographer used the stage managing technique because the women in the photograph purposefully posed for the picture in order to let others know about their plight. She wanted to develop awareness as well as wanted the Government to help farmers.
  • The name of the women in the picture is Florence Owens Thompson and she was a mother of seven children. She lived in California.

8 0
3 years ago
Read 2 more answers
Draw a flow chart that accepts mass and volume as input from the user. The flow chart should compute and display the density of
TiliK225 [7]

Answer:

See attachment for flowchart

Explanation:

The flowchart is represented by the following algorithm:

1. Start

2. Input Mass

3. Input Volume

4 Density = Mass/Volume

5. Print Density

6. Stop

The flowchart is explained by the algorithm above.

It starts by accepting input for Mass

Then it accepts input for Volume

Step 4 of the flowchart/algorithm calculated the Density using the following formula: Density = Mass/Volume

Step 5 prints the calculated Density

The flowchart stops execution afterwards

Note that the flowchart assumes that the user input is of number type (integer, float, double, etc.)

6 0
3 years ago
In what order does the air flow in a canister vacuum cleaner pass through the following components?
Anika [276]
D filter motor bag and fan
4 0
3 years ago
Which intel processor technology interconnects the processor, chipset, and wireless network adapter as a unit, improving laptop
Ira Lisetskai [31]
Apu?
....................
8 0
4 years ago
Other questions:
  • For film editors, which task comes last in their workflow pattern?
    12·2 answers
  • You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will
    12·1 answer
  • You are an interior decorator, confronted with a dark living room. To lighten the room up, you have n candles and want to build
    12·1 answer
  • How is it possible to find encyclopedias and reference texts on the internet
    11·2 answers
  • because of online writing, our audience: A. Compromise older people B. are bigger than before C. usually read less often D. are
    15·2 answers
  • Drag the correct type of update to its definition.
    14·1 answer
  • Trojans depend on ________ to spread. A rootkits B self-replication C code injection D social engineering
    14·1 answer
  • ___ is a career discipline focusing on helping companies use computer technology effectively.
    9·1 answer
  • The main function of a(n) ____________________ is to centralize access control for the network by keeping an eye on both inbound
    9·1 answer
  • If “A” represents in binary 10011001, what will be the value of word “CAB”?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!