1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tatiana [17]
3 years ago
15

You want to decide whether you should drive your car to work or take the train. You know the one-way distance from your home to

your place of work, and the fuel efficiency of your car (in miles per gallon). You also know the one-way price of a train ticket. You assume the cost of gas at $4 per gallon, and car maintenance at 5 cents per mile. Write an algorithm to decide which commute is cheaper.
Computers and Technology
1 answer:
tester [92]3 years ago
3 0

<u>Explanation:</u>

Remember, an algorithm in simple words means a set of instructions or steps to be followed in other to solve a problem.

Note, to decide which commute is cheaper, it means the output of the algorithm should be the cheaper way to commute.

Using pseudocode do the following;

  • determine the inputs and outputs of the problem
  • arrange the identified problem into micro-tasks
  • describe each micro-tasks in the pseudocode
  • Test the pseudocode by solving the problem.

                       

You might be interested in
How do companies use LinkedIn ?
Semenov [28]

Answer:

  1. Introducing new products or services you’ve developed.
  2. Differentiating yourself from your competitors.
  3. Finding job candidates who can make a significant contribution to your business success.
  4. Checking on what your competition is doing.
  5. Improving your ranking in search engines.
8 0
3 years ago
Read 2 more answers
Explain the purpose of Data Layer, in the Layered modelfor web applications?
matrenka [14]

Answer:

Purposes of Data Layer, in the Layered model for web applications are as following:-

1. The data Layer,is the third layer and it takes care of the all the operations concerning the database level.

2. This data layer gets a command from the application layer to send a query to the database and will process this command according to the type of database that is used.

3. It will ensure that the correct connections to the database are set.

4. It is represented by the Database.

7 0
3 years ago
Which is true about SSH and Telnet?
MaRussiya [10]

Answer:

Data is encrypted on SSH

Explanation:

Telnet and SSH both are the networking protocols. These protocol are used for the security of data. In telnet data is sent over the link without any encryption. That is the reason, in telnet protocol data is less secure.

In SSH (Security Shell) protocol data has been encrypted before transmission. The encryption of data make it more secure between transmitter and receiver.

So the true statement is that, SSH has data encryption.

8 0
3 years ago
PLEASE HELP!!!
tino4ka555 [31]

Answer:

C or D

Explanation:

If he has previous experience, C might be better answer, otherwise, D is right.

not sure with my answer either lol

6 0
3 years ago
="Jack"&amp;"$"&amp;"Jill". What will be the output of this formula?​
natita [175]
I’m so confused on this but hey here’s this

3 0
3 years ago
Other questions:
  • Can I have help on this
    7·2 answers
  • What is the part of the browser window that displays the content of the web page such as pictures and text called?
    10·1 answer
  • Robin ensures that she is always available if anyone in the team needs her. Which quality is shown by robin?
    9·2 answers
  • Variablesallow us to manipulate data through the ___________.
    6·1 answer
  • You asked your colleague to provide feedback on a blog post you recently wrote. When they sent you their feedback, they made edi
    10·1 answer
  • Pressing the e key while in edit mode will exit the interaction mode<br><br> true<br><br> false
    7·1 answer
  • When creating a chart or graph, which should be completed first?
    9·2 answers
  • Which of these is the function of a modeler?
    5·2 answers
  • One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or
    9·2 answers
  • TRUE AND FALSE
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!