1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ss7ja [257]
3 years ago
7

An advantage of using a heuristic over an algorithm is that the heuristic insures a correct answer.

Computers and Technology
1 answer:
MrRa [10]3 years ago
3 0

An advantage of using a heuristic over an algorithm is that the heuristic can be quicker.

b. the heuristic can be quicker.

<u>Explanation:</u>

Heuristic procedure is a standard or a technique that originates as a matter of fact and causes you thoroughly consider things, similar to the procedure of disposal, or the procedure of experimentation. You can think about a heuristic as an alternate way.

In software engineering, a heuristic is a procedure intended for taking care of an issue all the more immediately when great strategies are excessively moderate, or for finding an inexact arrangement when exemplary techniques neglect to locate any definite arrangement. This is accomplished by exchanging optimality, culmination, exactness, or <u>accuracy for speed</u>.

You might be interested in
What correctly describes the features of the service called kickstarter?
Nikitich [7]

Kickstarter is a crowdfunding platform that offers opportunities for its users to financially invest in projects made by others users. The projects available are incredibly varied in terms of its product category ranging from technological innovations to board games. The platform has been around since 2009. Users who can post projects come from various countries, such as United Kingdom, United States, Spain, and even Hong Kong. To date, Kickstarter has managed to raise more than USD 1 billion for over 250,000 projects.

4 0
4 years ago
Read 2 more answers
What might be the explanation for the following scenario? A user reports that it took a longer than usual amount of time to acce
emmainna [20.7K]
<h2>Answer: </h2>

Usually a report is fetched from the database where data from all previous years is available. Once data is fetched, the raw data is compiled and formulated into appropriate report. The reason that report took longer is that user might have selected a date range from last two years until now which means that entire two years data was fetched from the database, operations were performed onto the raw data and the compiled data was then adjusted as per the report output.


3 0
4 years ago
What are some of the risk associated with professional emails
noname [10]

Answer:

the answer is its a lot of riskes you would have to worry about tour email getting haacked into and lossing all of your personal information

Explanation:

5 0
3 years ago
What is life all about?
zloy xaker [14]
Life can be about anything........
8 0
3 years ago
Read 2 more answers
You use the same five shell functions every day and are looking for a way to ensure they are available as soon as you log into y
ANTONII [103]

Answer:

.c. Load them via your login script.

Explanation:

Given that using functions in shell scripts enhances programming output and login script comprises the functions and statements required to effectively execute at any given time the user logs into their account.

Hence the moment these functions are formulated, they are then executed through a single command statement thereby reducing the time of re-writing another set of code repeatedly in every program.

Therefore, in this case, what you can do is to "Load them via your login script."

4 0
3 years ago
Other questions:
  • Are there protections for people in terms of what data can be collected by different sites?
    10·1 answer
  • Most shops require the technician to enter a starting and ending time on the repair order to track the actual time the vehicle w
    14·2 answers
  • 3. By eliminating data redundancy, you're enforcing data A. validation. B. integrity. C. consistency. D. accuracy.
    14·2 answers
  • Assume that the myname.txt file is currently closed. write the code segment that opens the file without erasing it, write anothe
    13·1 answer
  • Every computer consists of physical components and nonphysical components. the nonphysical components of a computer that underst
    9·1 answer
  • ________ is the standard communications protocol used on most client/server networks.
    9·1 answer
  • A sequence of data values separated by commas can be made into a list by enclosing the sequence in what type of symbols?
    5·1 answer
  • Melinda completed the Computer Programming Aptitude Test when she applied for a position with Beta Electronics. Six months later
    14·1 answer
  • What charts the cost to the company of the unavailability of information and technology and the cost to the company of recoverin
    15·1 answer
  • What type of storage drive contains multiple spinning platters?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!