1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jonny [76]
3 years ago
7

Numerical methods are implementations of mathematical algorithms, but constructed with special consideration for accuracy of sol

utions and computational run-time. The order in which we implement floating point arithmetic for any numerical method will effect the accuracy of the final computed value. For this reason, extra thought must be placed on our basic mathematical operations. In this problem, you are asked to add-up the values in a large array called data. How should you do this to achieve the most accurate final sum
Computers and Technology
1 answer:
Mandarinka [93]3 years ago
8 0

Answer:

find detailed description of algorithms (direct and iterative methods) in books [8], [3], [24]. We limit ourself to only selected problems and methods which are important in chemical engineering. 1.2.1 Conditioning of a system of linear equations We do not compute accurately because of rounding errors, which affect results of calcu-lations.

Explanation:

You might be interested in
If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is b
3241004551 [841]

Answer:

The correct answer to the given question is " Star Topology ".

Explanation

In the star topology, all the devices are connected to one central device in the network. It means every individual device is connected individually with the central device in the network.

The main drawback of star topology is that if the central device fails then all the device which are connected with them is also failed. The second drawback of star topology is to connect with the central device it requires more cabling.

8 0
3 years ago
How much time does a gold chest take to open
MaRussiya [10]

Gold chest takes 8 hours to open or unlock.

<u>Explanation:</u>

Clash royale is a game which has been developed and published with the help of a super cell. It is a video game. Many players can play this game at the same time. In the sense, clash royale is a multi player game.

In this game, the players who are playing the game are awarded with the gold chest. They are also awarded with the gems. In order to unlock or open a gold chest eight hours are needed. Apart from this there is an other way also with which the gold chest can be unlocked. It can be unlocked with the help of forty eight gems.

7 0
3 years ago
If we compare the push function of the stack with the insertFirst function for general lists, we see that the algorithms to impl
Jet001 [13]

Answer:

True

Explanation:

<u>Algorithm for push function</u>

The method of placing data on a stack is called a push operation.

It involves these steps −

  • Check that the stack is complete.  
  • If the stack is complete, it will cause an error .  
  • Increases top to point next empty room if the stack is not complete.  
  • Adds the data component to the place of the stack where top is pointing.
  • Success returns.

<u>Algorithm for Insertfirst function</u>

  • Create a new Link with provided data.
  • Point New Link to old First Link.
  • Point First Link to this New Link.

As we can see that in both algorithms ,we are inserting data to a new nodes and incrementing/pointing to a new node for inserting data.Both algorithms uses the same approach.

8 0
3 years ago
Effective communication skills are a desirable workplace skill
OLga [1]
Yes. If there is no effective communication in the workplace then nothing is going to be done.
4 0
3 years ago
NIST recommends selecting cloud providers that support strong encryption, have appropriate redundancy mechanisms in place, emplo
WITCHER [35]

Answer:

The answer is "Option a".

Explanation:

In cloud computing, it is also known as the model, that enables you for accessible, convenient, through the-demand network access to global computer resources, which can be rapid to get and published via low administrative effort.  

Its recommending selection for the cloud providers support for the robust encryption, that has adequate replication processes in place, use user authentication, or provide ample clarity to customers regarding mechanisms that defend subscriptions against other subscriptions and the supplier.

8 0
3 years ago
Other questions:
  • Given the integer variables x and y, write a fragment of code that assigns the larger of x and y to another integer variable max
    5·1 answer
  • A person who wants to buy a compact disc (cd) has just enough money to buy one, and chooses cd a instead of cd
    10·2 answers
  • To enter a typed number into a cell, you press Tab or Backspace?​
    7·2 answers
  • after placing her insertion point after grandma's kitchen, order the steps Danica needs to follow to insert and format the regis
    12·2 answers
  • Identifies the row and column that forms the cell
    11·1 answer
  • Mariah was working on a multimedia presentation that included both video and audio files. The file was huge, and she wanted to s
    13·2 answers
  • Which person would be the best fit for a career in the Information Technology field?
    6·2 answers
  • You want to calculate a bonus if the sold price was at least equal to the listing price, and if the house sold within 30 days af
    6·1 answer
  • The word ____ at the end of several of the member functions in the accompanying class definition specifies that these functions
    10·1 answer
  • How does a search engine use algorithms to provide search results?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!