1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uranmaximum [27]
3 years ago
5

Nathan has a 30-second clip of music that he wants to play over and over again when he runs a program. What does Nathan need to

make this happen?
a for loop
a while loop
an infinite loop
a Boolean loop
Computers and Technology
2 answers:
pshichka [43]3 years ago
6 0
The answer is an infinite loop
Serga [27]3 years ago
3 0

Nathan has a 30-second clip of music that he wants to play over and over again when he runs a program. What does Nathan need to make this happen?

a while loop

You might be interested in
My friend Leo wants to have an emergency plan for his final exams on University of Southern Algorithmville. He has N subjects to
leonid [27]

Answer:

Greedy is an algorithmic paradigm that builds up a solution piece by piece, always choosing the next piece that offers the most obvious and immediate benefit. Greedy algorithms are used for optimization problems. An optimization problem can be solved using Greedy if the problem has the following property: At every step, we can make a choice that looks best at the moment, and we get the optimal solution of the complete problem.

If a Greedy Algorithm can solve a problem, then it generally becomes the best method to solve that problem as the Greedy algorithms are in general more efficient than other techniques like Dynamic Programming. But Greedy algorithms cannot always be applied. For example, the Fractional Knapsack problem (See this) can be solved using Greedy, but 0-1 Knapsack cannot be solved using Greedy.

The following are some standard algorithms that are Greedy algorithms.

1) Kruskal’s Minimum Spanning Tree (MST): In Kruskal’s algorithm, we create an MST by picking edges one by one. The Greedy Choice is to pick the smallest weight edge that doesn’t cause a cycle in the MST constructed so far.

2) Prim’s Minimum Spanning Tree: In Prim’s algorithm also, we create an MST by picking edges one by one. We maintain two sets: a set of the vertices already included in MST and the set of the vertices not yet included. The Greedy Choice is to pick the smallest weight edge that connects the two sets.

3) Dijkstra’s Shortest Path: Dijkstra’s algorithm is very similar to Prim’s algorithm. The shortest-path tree is built up, edge by edge. We maintain two sets: a set of the vertices already included in the tree and the set of the vertices not yet included. The Greedy Choice is to pick the edge that connects the two sets and is on the smallest weight path from source to the set that contains not yet included vertices.

4) Huffman Coding: Huffman Coding is a loss-less compression technique. It assigns variable-length bit codes to different characters. The Greedy Choice is to assign the least bit length code to the most frequent character. The greedy algorithms are sometimes also used to get an approximation for Hard optimization problems. For example, the Traveling Salesman Problem is an NP-Hard problem. A Greedy choice for this problem is to pick the nearest unvisited city from the current city at every step. These solutions don’t always produce the best optimal solution but can be used to get an approximately optimal solution.

6 0
3 years ago
Security is a major concern with m-commerce. How can m-commerce software ensure the security of transmissions and that the trans
dimaraw [331]

Answer:

Security in communication between applications and sites in m-commerce can use SSL technology.

Explanation:

While developing an app, developers have to perform several checks and ensure that the server has a legitimate certificate.

7 0
2 years ago
When are numbered lists generally used
tatuchka [14]

C. When listing items that have an order of priority.

Explanation:

There are a lot of ways to list items such as alphabets and Roman numerals.

And the all have their respective reasons.

When numbering in order of priority, it is more appropriate to use numbers instead of alphabets and Roman numerals.

8 0
3 years ago
The _____ contains a series of sections designed to prepare students for the ACT
Studentka2010 [4]
The answer is aspire test 
3 0
4 years ago
Read 2 more answers
Describe how to find out a file type by using your Computer.
user100 [1]

First you go to the 3 dots neer the x you pres it thin you go to downloads and it shod be ther i hop i help if so make me the branliy

8 0
3 years ago
Read 2 more answers
Other questions:
  • If you had a chance to see what your life would be like in 20 years
    8·1 answer
  • Different units of CPU ?
    12·1 answer
  • In the ____, or ad hoc, layouts configuration, there is no access point at the center of a cell.
    7·1 answer
  • 1. The number of major solutions for preventing workplace hazards is
    14·1 answer
  • On the Visit screen, you will not see one of the following:
    13·1 answer
  • A manger wants to hire a new technician for the desk that typically assists clients with simple computer problems over the phone
    9·1 answer
  • A bank has reworked its mortgage application process so that several steps are handled by computer software, and some steps are
    11·1 answer
  • When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was runn
    9·1 answer
  • If nobody buys a ticket to a movie, do they still show it?
    5·1 answer
  • Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the inte
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!