1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nirvana33 [79]
3 years ago
12

Through the use of computational thinking techniques, models and algorithms can be created. A(n) ___1___ can be created that rep

resents the generalized problem. A(n) __2___, or set of step-by-step instructions, can be developed to solve the problem.
1: Algorithm, Model
2: Algorithm, Model
Computers and Technology
2 answers:
Andreyy893 years ago
8 0

Answer: Can We insert the answer in the slots

Explanation:

professor190 [17]3 years ago
8 0
I think this is correct:
Through the use of computational thinking techniques, models and algorithms can be created. A(n) abstraction can be created that represents the generalized problem. A(n) decomposition , or set of step-by-step instructions, can be developed to solve the problem.
You might be interested in
Consider sending a stream of packets from host a to host b using ipsec. typically, a new sa will be established for each packet
nordsb [41]

Consider sending a stream of packets from Host A to Host B using Ipsec. Typically, a new SA will be established for each packet sent in the stream. True or False? Tweet Answer FALSE. REASON: Ipsec SA is first connect with Host A and Host B. So, all packets in the stream use the new SA.

8 0
2 years ago
In what form do the hexadecimal numbers need to be converted for a computer’s digital circuit to process them?
MrMuchimi

Hexadecimal numbers are just a convenient representation of binary data. When entered as text, they consist of ASCII characters 0-9 and a-f. The numbers will then have to be converted to binary. This is accomplished by converting to uppercase, subtracting the ASCII offset (48 for 0-9 or 55 for A-F), so that the result is a number between 0 and 15 (inclusive). This can be stored in computer memory to represent 4 bits.

Hexadecimal numbers represent binary numbers in the following way:

hex | binary

0 = 0000

1 = 0001

2 = 0010

3 = 0011

4 = 0100

5 = 0101

6 = 0110

7 = 0111

8 = 1000

9 = 1001

a = 1010

b = 1011

c = 1100

d = 1101

e = 1110

f = 1111

As you can see, no other 4 bit combination exists.



5 0
3 years ago
__________ are very simple devices that connect network components, sending a packet of data to all other connected devices.
taurus [48]

Hubs are very simple devices that connect network components, sending a packet of data to all other connected devices.

Hubs are relatively basic network connectors that send a packet of data to every other connected device. Compared to a hub, a switch is more intelligent and has the ability to filter and forward data to a specific location. Within various networks, switches are utilized. Nodes of the network are any computers or printers connected to it. A network workstation is a personal computer that is linked to a network (note that this is different form the usage of the term workstation as a high-end microcomputer). Nodes of the network are any computers or printers connected to it. A network workstation is a personal computer that is linked to a network.

Learn more about network here-

brainly.com/question/24279473

#SPJ4

8 0
1 year ago
why does it not let me create a new account when i log out of this one and go to join now after i fill everything out it wont le
frozen [14]
Try linking an email to your account, if it doesn’t work select forgot your password and you should receive an email where you can re make or change your password to something easier to remember. Are you using the same email account every time, this may also be the reason, if it is the same email they will not allow you to reuse it and it should tell you the email is already in use. Hope this helped
5 0
4 years ago
Plz help meeeeee QUICKLY!!! WORTH 15 POINTS!
Lady bird [3.3K]

Answer:

Im pretty sure Domain name system but dont trust me

Explanation:

8 0
4 years ago
Other questions:
  • Which of the following is an important initial step in designing an interface
    7·1 answer
  • You can avoid culture shock by ____________.
    10·2 answers
  • Who all likes fortnite
    15·2 answers
  • Given a String variable response that has already been declared, write some code that repeatedly reads a value from standard inp
    10·1 answer
  • 12) If the image's name is filename.gif, how can I make this image the background of my page?
    6·1 answer
  • A popular database software program called ____ offers a wizard and QBE tool to help build and generate SQL queries
    9·1 answer
  • Explain the computer according to size​
    10·1 answer
  • Which of the following statements best reflects the pros and cons of overtime potential for a line installer or repairer?
    15·1 answer
  • Fre.....ee p......oint....s
    15·2 answers
  • A photographer stores digital photographs on her computer. In this case the photographs are considered the data. Each photograph
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!