1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
love history [14]
3 years ago
12

How are programs and algorithms related? A program is a part of an algorithm. They are not connected at all. An algorithm is a p

art of a program. They are the same. ​
Computers and Technology
1 answer:
almond37 [142]3 years ago
6 0

Answer:

A program is a set of instructions that a computer executes.

An algorithm is a set of instructions that must be done in order to get some result.

If an algorithm is written in a programming language, then the program is an implementation of the algorithm.

An algorithm must not, however, be a program. An algorithm can also be performed manually (e.g. calculate 6431 + 8316 on paper or in your head).

Explanation:

You might be interested in
A type of authentication that requires the user to provide something that they know, such
bagirrra123 [75]
The answer would be true
5 0
3 years ago
The process of making raw materials into a finished product is known as
Olin [163]
1.) Business Engineering or Manufacturing :)
<span />
6 0
3 years ago
Read 2 more answers
Which is the correct expansion of the term Internet? 
kirill115 [55]

Answer:

international network

Explanation:

8 0
3 years ago
Read 2 more answers
13) What are the benefits and detriments of each of the following? Consider both the systems and the programmers’ levels. a. Sym
dsp73

Answer:

Automatic and Explicit Buffering.

In the case of explicit buffering, the length of the queue is provided while in automatic buffering the queue size needs to be indefinite. In automatic buffering there is no need to block the sender while coping the message. While in explicit buffering the sender is blocked for the space in queue.

No memory is being wasted in explicit buffering.

Send by Copy and Send by Reference.

By using the send by copy method, the receiver is not able to change the state of parameter while send by reference allow. The advantage of using the send by reference method is that it allows to change a centralized application to its distributed version.

Fixed-sized and Variable-sized Messages.

In fixed size messaging refers, the buffer size is fixed. This means only a particular number of messages can only be supported by the fixed size buffer. The drawback of the fixed size messages is that they must be a part of fixed size buffer. These are not a part of variable size buffer. The advantage of variable size message is that the length of the message is variable means not fixed. The buffer length is unknown. The shared memory is being used by the variable size messages.

Explanation:

5 0
3 years ago
The Turing test consists of a person asking written questions of a person and a computer. If the questioner can't tell which one
Juliette [100K]

Answer:

intelligence

Explanation:

According to my research on information technology, I can say that based on the information provided within the question if this happens then we can say that the computer has attained intelligence. This is because this is a test developed by Alan Turing in 1950, in order to observe a machine's ability to exhibit intelligent behavior equal to, or indistinguishable from, that of a human.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
Other questions:
  • Universal Containers recently rolled out a Lightning Knowledge implementation; however, users are finding unreliable and unrelat
    6·1 answer
  • What can you do in the Mouse section of the Devices and Printers menu?
    13·1 answer
  • Browsing the web is one of the most common activities performed by individuals who use computers.
    12·1 answer
  • Data means a group of numbers. <br> a. True<br> b. False
    7·1 answer
  • High capacity circuits are limited by the least capable network link, which is typically the user connection. As such, it is imp
    11·1 answer
  • Which of the following access control techniques allows the user to feel empowered and able to change security attributes?
    5·1 answer
  • When powering up a home network, make sure all computers and peripherals are turned on before turning on the modem/router?
    11·1 answer
  • WILL UPVOTE ALL
    10·1 answer
  • Which of these causes the most collisions?
    14·1 answer
  • Buying a home security system is an example of protecting your home against________.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!