1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11111nata11111 [884]
3 years ago
7

If you are writing an algorithm and you aren’t confident that you understand the problem, what can you do?

Computers and Technology
1 answer:
Zigmanuir [339]3 years ago
8 0

Answer:

divide it into smaller pieces

Explanation:

Usually, the main reason a programmer does not understand a problem fully is that there is too much information. The best way to try and fully understand a problem is to divide it into smaller pieces. Start off by answering the question what is the expected output for an input. Then divide each individual issue within the problem. This will allow you as a programmer/developer to create an individual solution for each individual issue within the problem and then test to make sure that the input gives the correct output.

You might be interested in
Can i have two e-mail accounts on my android
Scrat [10]
Yes, if you download an app such as gmail or yahoo mail. hope this answered your question.
5 0
3 years ago
Which of the following best explains why algorithms are written in the design phase?
Annette [7]

Answer:

D. Algorithms need to be written in the design phase so they can be translated into code in the development phase.

Explanation:

5 0
3 years ago
External network security threats can include management failure to support organization-wide security awareness, inadequate sec
stiks02 [169]

Answer:

B. False

Explanation:

External security threat can be defined as any threats coming outside the company's computer network operation, usually carried out with negative or hostile intent for the purpose of stealing information or distracting the flow of operation. For example, Virus Attack

However, given that the question talked about the "management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures."

Hence, this is not an External Security Threat, which means, the correct answer is FALSE.

5 0
4 years ago
Assume X and Y are indepndent. Assume that X has mean 10 and standard deviation 8. Assume Y has mean 12 and standard deviation 6
Vitek1552 [10]

Answer:

\sigma_z = 10

Explanation:

Given

\bar x = 10

\sigma_x = 8

\bar y = 12

\sigma_y = 6

z = x + y

Required

\sigma_z

This is calculated as:

\sigma_z = \sqrt{Var(x) + Var(y)}

Calculate Var(x)

We have:

Var(x) = \sigma_x^2

Var(x) = 8^2

Var(x) = 64

Calculate Var(y)

We have:

Var(y) = \sigma_y^2

Var(y) = 6^2

Var(y) = 36

So, we have:

\sigma_z = \sqrt{Var(x) + Var(y)}

\sigma_z = \sqrt{64 + 36}

\sigma_z = \sqrt{100}

\sigma_z = 10

6 0
3 years ago
2. What may happen if a large number of computer users are attempting to access a Web site at the same time that you are?
Pachacha [2.7K]
The website may crash if it was not built to sustain a large number of viewers.
6 0
3 years ago
Read 2 more answers
Other questions:
  • Mark, David, Tia, and Ashley are team members in a computer programming class. They have been assigned the task of creating a co
    12·1 answer
  • Which is the most efficient way to italicize a row of text in every worksheet in a workbook?
    8·1 answer
  • 1. What is the difference between a learner’s license and an operator’s license?
    10·1 answer
  • A __engineer specializes in computer hardware design and integration.
    15·1 answer
  • Which one of the following oscilloscope controls is used to move the trace up and down the screen vertically
    14·1 answer
  • What component of Kerberos is responsible for storing keys for encrypting and decrypting data in the authentication process?
    13·1 answer
  • What type of version of visual studio is the visual studio express
    8·1 answer
  • Which of the following technique is well suited to support very large address space, e.g. 64-bit address space? Select one: a. C
    11·1 answer
  • Laura is filming a scene in which the subject is sitting with a lit fireplace behind him. The only other source of light in the
    15·1 answer
  • We can improve our knowledge and skills on animals and fish raising with the use of internet​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!