1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Irina18 [472]
3 years ago
12

Which step in the software development life cycle involves writing pseudocode?

Computers and Technology
1 answer:
Andrews [41]3 years ago
6 0
Once the pseudocode is accepted by the team, it is rewritten using the vocabulary and syntax of a programming language. The purpose of using pseudocode is an efficient key principle of an algorithm. It is used in planning an algorithm with sketching out the structure of the program before the actual coding takes place.
You might be interested in
Consider the following modification to the Merge Sort algorithm: divide the input array into thirds (rather than halves), recurs
ehidna [41]

Answer:

The correct answer to the following question will be "n logn".

Explanation:

  • Time Complexity should be the same as the whole last particular instance, just the log base keeps changing with three.  
  • Throughout the circumstance of separating 2 arrays, we want one correlation. however, for splitting between 3-way arrays, will require 2 comparisons to sort.
  • However, after breaking the array into 3, we can lower the number of transfers by growing the comparison. So the time complexity would then persist the same, but the log should get base 3 as we've classified into different parts.

So the time complexity will be:

⇒  T(n)=3T(\frac{n}{3})+ O(n)

⇒          =O(n \ logn) \ with \ base \ 3

7 0
3 years ago
How can chess computers be programmed so that it can be so accurately adjusted to a skill level ranging from a beginner to a gra
Elis [28]
They are artificially intelligent. They watch thousands of hours of videos of the game they are going to play. After they learn, they challenge themselves against themselves and save all the moves it used that time, they play another game against the saved game and if they best it then they save the new and repeat. I am not sure about this because I am just a 15 yr old but the early ones brute forced the game and one. Brute Forcing is a way to try out every possible move and pick the most like to succeed or the most efficient one, brute force is also used in hacking or cracking passwords that have something in common. Like let's say ur password is Jakeis35. I would make a list that would be:
Jake
jake
Is
is
35
34

and with a software it will put together every possible pair and will stop when it matches the password on the server or if the password let it login.
5 0
3 years ago
Who is Majira Strawberry??? My Friend said it so i am wondering
otez555 [7]

Answer:

he/ she is a furry

6 0
3 years ago
Read 2 more answers
Consider the following scenario. As you troubleshoot the problem, what motherboard device would be the first to
prohojiy [21]
Check if the board is getting power, if it isn’t, than you may have a power supply issue.
8 0
3 years ago
What is the difference between a rendering engine and a browser engine?
Vlada [557]

Answer:

D) A rendering engine displays content on the screen and a browser engine coordinates user interface interactions.

Explanation:

The rendering engine will deal with all the HTML code and will generate an output based on its own rules for interpreting the code.  That's why different rendering engines will have different renditions of the same given HTML code. You can notice that in the acceptance of HTML5 and CSS3 tags, which are not universal yet.

The browser engine will deal with the user interface and all other features that make a browser a browser, relying on the rendering engine for the display.

That duality allows different browsers to use the same rendering engine, thus have similar outputs.

7 0
3 years ago
Read 2 more answers
Other questions:
  • How to program chamberlain universal garage door opener?
    13·1 answer
  • The difference between the various networks is the ______ of the coverage.
    11·2 answers
  • What are the constraints for designing small and large files and how these are resolved in different file system
    7·1 answer
  • Which one of the following statements referring to mobile Internet
    5·2 answers
  • When evaluating portable CD players, you consider price, the sound quality, and ease of using the controls. These are your _____
    8·2 answers
  • Write a C# program named InchesToCentimeters that declares a named constant that holds the number of centimeters in an inch: 2.5
    14·1 answer
  • Which principle suggests that specific single responsibility interfaces are better than one general purpose interface?
    13·1 answer
  • Assume that processor refers to an object that provides a void method named process that takes no arguments. As it happens, the
    5·1 answer
  • A __________ search engine focuses on a specific subject.<br><br>answer : Specialized
    8·1 answer
  • 4.2 Code Practice: Question 2​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!