1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leni [432]
3 years ago
9

How to do “Pseudocode” and “FlowChart” in this question ? Please Help mee

Computers and Technology
1 answer:
Amanda [17]3 years ago
6 0

Answer:

There is no complicated algorithm required for this problem. After getting the inputs from initial velocity (u), acceleration (a), and time (t), <em><u>you can use the kinematics formula: x=ut + (1/2)at^2</u></em> to solve for the distance traveled.

Explanation:

Some very simple pseudocode:

1. Get Initial Velocity and set as u

2. Get Acceleration and set as a

3. Get Time and set as t

4. Set x to u*t + (1/2)*a*t*t

5. Return x

You might be interested in
An airline company would like to easily locate lost luggage. What technology would make it easier for them to locate the luggage
viktelen [127]

R.F.ID Radio  frequency identification  

3 0
3 years ago
Read 2 more answers
What is the advertising photographer’s main objective in creating an image?
iren2701 [21]
B. To sell it as a product
8 0
3 years ago
Sergio needs to tell his team about some negative feedback from a client. The team has been
LekaFEV [45]

Answer do you still need the answer or am i to late lol?

Explanation:

5 0
3 years ago
Password combined with pin used as an authentication requirement is an example of:
Bingel [31]
...something that the user knows.
4 0
4 years ago
Write a detailed three page report that summarizes how data scientists are utilizing data mining to predict future trends and be
LiRa [457]

Answer: given in the explanation

Explanation:

Data mining is referred as an automated processing tool used for sorting and analyzing enormous data and information which indeed are ``aimed towards effectively identifying trends and patterns and establishing relationships to solve business problems and generate new opportunities. Furthermore data mining techniques also helps to predict what’s going to happen in the future and act accordingly to take benefit of forthcoming tendencies.

Data mining is applied to a variety of large-scale data-processing activities such as collecting, extracting, warehousing and analyzing data. It also includes decision-support applications and technologies such as business artificial intelligence and machine learning and is used in varied areas of business research such as product development, sales and marketing etc.

Data mining is for taking advantage of data to predict ;

  • Mathematical algorithms, and, data are used for predictive analytics. One can capture information, and, use it to model sales pattern, trends, and, customer behaviour
  • Data mining uses algorithms to extract, and, analyze information; discover hidden patterns
  • It uses data patterns, and, is thus closely tied to machine learning
  • Historical & current information is used to predict future trends

Data mining can be used for the following:

  • Data mining in gas & oil operations - Mining data in gas & oil operations involves committing to key technologies, and, processes; and, embracing new ways of thinking & problem-solving. Firms can use exploratory data analysis, modelling techniques & model development; approaches to put models into production
  • Big data - Performance computing & advanced analytics
  • Magic Quadrant - Evaluate 16 vendors to identify the right ones
  • Heavy reading, network analytics - Optimize network; evaluate network performance; provide targeted marketing; fine-tune capacity.

5 0
4 years ago
Other questions:
  • The two types of one-time-password tokens are ______ and ______.
    10·2 answers
  • The different concepts in the architecture operating model are aligned with how the business chooses to integrate and standardiz
    10·2 answers
  • Why do primitive types have ranges of values? what determines the range of the data type?
    15·1 answer
  • What can an attacker use to capture switch traffic that wouldn't normally be sent to the port the sniffer is attached to?
    5·1 answer
  • C++
    11·1 answer
  • 31. Explain what the program does. Write out the output 20 PRINT "Hellooo00000000000, world!" 30 PRINT "I'm learning about comma
    7·1 answer
  • Write any two web browers​
    10·1 answer
  • PLEASE HELP! 100 POINTS!
    7·1 answer
  • Explain why the local disc of a computer start from C and not A​
    6·1 answer
  • 8. Give regular expressions with alphabet {a, b} for
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!