1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natulia [17]
2 years ago
7

2) What are two reasons we analyze algorithms?

Computers and Technology
2 answers:
Likurg_2 [28]2 years ago
8 0
It’s a making sections about what algorithms to use
dexar [7]2 years ago
5 0

Answer:

Make decisions about what algorithms to use

Explanation:

You might be interested in
Where are my files shortcut in documents folder.
faust18 [17]

Answer: Search File Explorer: Open File Explorer from the taskbar or right-click on the Start menu, and choose File Explorer, then select a location from the left pane to search or browse. For example, select This PC to look in all devices and drives on your computer, or select Documents to look only for files stored there.

Explanation: hope this helps :)

4 0
2 years ago
According to the Center for 21st Century Skills, critical thinking ability includes all of the following skills, EXCEPT ______.
Readme [11.4K]

Answer:

communicate clearly

Explanation:

4 0
3 years ago
Help 25 points!!!!!!!
Len [333]

Answer:

can u say what the word bank is plz?

Explanation:

3 0
3 years ago
Read 2 more answers
Which of the following are true about Public Key Encryption?
BabaBlast [244]
A is the correct answer
5 0
3 years ago
Develop a spreadsheet that compares the features, initial purchase price, and a two-year estimate of operating costs (paper, car
antiseptic1488 [7]

Answer:

dgfdghvcsdhjccxadhhvcsdhjvczafjmbd FYI jjgdc

3 0
3 years ago
Other questions:
  • what properties are associated with all Microsoft Office files and include author, title, and subject
    5·1 answer
  • Values that are sent into a function are called _________.<br><br> Program Output
    7·1 answer
  • Cryptolocker is an example of what type of malware?
    11·1 answer
  • _______ refers to the poitically, religiously, or ideologically motivated use of computers (or related technology) by an individ
    15·1 answer
  • Keyboards and printers are two examples of _________ devices.
    6·1 answer
  • Select the correct answer from each drop-down menu.
    6·1 answer
  • Agile Software Development is based on Select one: a. Iterative Development b. Both Incremental and Iterative Development c. Inc
    11·1 answer
  • Please need help.... The system development process is called a cycle. Which of the following may be an ongoing process which su
    6·1 answer
  • A period in which unemployment is low, business produces many goods and services, and wages are good is called ______.
    8·1 answer
  • In a database, what term is used to describe a group of fields that are all associated with and accessed using single primary ke
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!