1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nana76 [90]
3 years ago
8

What's the difference between pseudo code and natural language​

Computers and Technology
2 answers:
ArbitrLikvidat [17]3 years ago
8 0

Answer: While algorithms are generally written in a natural language or plain English language, pseudocode is written in a format that is similar to the structure of a high-level programming language. Program on the other hand allows us to write a code in a particular programming language.

LiRa [457]3 years ago
3 0

Answer:

The pseudo-code describes steps in an algorithm or another system in plain language. Pseudo-Code is often designed for human reading rather than machine reading with structural conventions of a normal language of programming.

Natural languages consist of phrases, usually declarative phrases, with a sequence of information.

Explanation:

  • Pseudo-Code is often designed for human reading rather than machine reading with structural conventions of a normal language of programming. It usually omits information that is essential to the understanding of the algorithm by the machine, for example, variable declarations and language code.
  • Easily human, but not machines, use the natural languages (like English).
  • Natural languages also are creative. Poetry, metaphor, and other interpretations are permitted. Programming permits certain style differences, but the significance is not flexible.
  • The aim of using pseudo-code is to make it easier for people to comprehensibly than standard programming language code and to describe the key principles of an algorithm efficiently and environmentally independently. It is usually used for documenting software and other algorithms in textbooks and scientific publications.
You might be interested in
Forensic scientists generally photograph and sketch a computer and its components during their analysis? True or false
jenyasd209 [6]
This is considered true sir 
6 0
3 years ago
Read 2 more answers
has anyone noticed to get credit for answering a question you don't even need to answer it correctly?
Helga [31]

Yes I've noticed this. Unfortunately it's up to the user (Asker) to report an answer incorrect.

8 0
4 years ago
Read 2 more answers
Complete data are very rare because some data are usually missing. There are typically four strategies to handle missing data.
netineya [11]

Answer:

see explaination

Explanation:

If I am to select I will select the strategy Impute the missing values . Because rather than deleting and all the other strategies. This is the best option because, this is an optional field as described there is no need for such accurate information about salary.

If we want to maintain this field we can just fill the value by identifying the similar records which is the other customers who is visiting the same no of times and fill that.

5 0
3 years ago
What is a blog that is set up for advertising purposes and used to send website links and other spam? A. splog B. adlog C. qlog
Alex_Xolod [135]

A. Splog. also known as "spam blog"

3 0
3 years ago
Read 2 more answers
PLZZZ HELLPP... PhotoShop
Burka [1]
LEFT SIDE :
Layer menu
Layer filters
Layer groups
Link layers

BOTTOM :
Layer effects
Layer menu
Visibility

RIGHT SIDE :
Add new layer
Opacity
Fill opacity

4 0
3 years ago
Other questions:
  • Read at least three (3) academically reviewed articles on Management Information Systems and complete the following activities:
    5·1 answer
  • What are the first and the last physical memory addressesaccessible using
    10·1 answer
  • Because one memory location can be used repeatedly with different values, you can write program instructions once and then use t
    7·1 answer
  • What is the significant feature of computer capabilities?​
    14·1 answer
  • What is variable declaration in java ​
    6·2 answers
  • Gina is driving her car down the street. She has a teddy bear sitting on the back seat. A dog runs in front of Gina's car, so sh
    15·2 answers
  • Suppose that a computer can read or write a memory word in 5 nsec. Also suppose that when an interrupt occurs, all 32 CPU regist
    10·2 answers
  • Assuming the Direct Hashing function and the Subtraction preprocessing algorithm is used to map keys into indices, give the inde
    15·1 answer
  • Give a tight bound on the number of times the z = z + 1 statement is executed. i = 2 while ( i > 1 ) { i = floor(i/2) z = z +
    7·1 answer
  • Remember not to use tools that are ________ in any way.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!