1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yakvenalex [24]
3 years ago
14

An ALGORITHM IS? PLEASE HELP

Computers and Technology
1 answer:
JulsSmile [24]3 years ago
8 0

Answer:

A set of instructions or set of rules.

You might be interested in
The most common markup language used with web pages is ___________ Question 4 options: A. HTML B. VRML C. Javascript
leonid [27]
Hi there!

The correct answer is A. HTML.

HTML stands for Hypertext Markup Language which is used in nearly all websites and web-based programs. HTML acts as a structure for a website giving you the text, page titles, text-boxes, etc... HTML is also used along with the languages of Javascript, CSS, C++, and others. DO NOT confuse languages like Javascript and the rest with Markup Languages because they are not the same! Javascript, for example, is what is used to make websites more user-friendly and interactive. When you use Brainly, for example, and you hover over someone's name or picture and that box pops up that is Javascript at work and not HTML or any other Markup Language.

-<span>ASIAX </span><span>  </span><span>Frequent Answerer</span>
4 0
3 years ago
Read 2 more answers
Outline a scenario in which you might be acting ethically but might still want to remain anonymous while using the Internet. How
kompoz [17]

Answer:

I would like to stay anonymous while criticizing the current government. As there have been many cases when people who wrote against the government's decisions were caught by the police.

So I would prefer to stay anonymous while commenting on various government policies. My friends would know about it because I share my posts only with them.

The government can know about my identity by ordering the social networking site to reveal it.

8 0
3 years ago
Encryption that uses 16-character keys is known as ____. strong 128-bit encryption strong 256-bit encryption military-strength 5
allsm [11]

Answer: Strong 128-bit encryption.

Explanation: An individual character corresponds to 8 bits . So if there are 16 characters then,

16\times8=128 bits keys

This makes the 128 bit key encryption the strongest amongst all other options.It is strongest because it is almost impossible to decode the 128-character key  by any method e.g.-brute-force method.

Other options are incorrect because the characters given by the other bits are as follows:  {\frac{256}{8}=32 characters

                         {\frac{512}{8}=64 characters

                         {\frac{512}{8}=128 characters  

Thus, the strongest character key is of 128 bits. for cipher.

3 0
3 years ago
What happens when two computers use the same IP address?
OLga [1]

Two computers can safely have the same IP address in certain cases. In most cases, if those two computers are on the same local network, it breaks connectivity for one or both of them. Internet protocols work by sending small, individually addressed messages. Each message can be routed differently.

I hope this helps you.

6 0
3 years ago
 What should every Software Engineer know about Software Architecture? ”<br> ??
Llana [10]
<span>Answer: -Software architecture isn't about big design up front; -Every software team needs to consider software architecture; -The software architecture role is about coding, coaching and collaboration; -You don't need to use UML; -A good software architecture enables agility.</span>
7 0
3 years ago
Other questions:
  • After you enter the details for the first selected recipient in the New Address List dialog box, click _______ to add another re
    11·2 answers
  • A banker would like to present a spreadsheet as part of a presentation to potential clients. The spreadsheet makes use of severa
    14·1 answer
  • Write a program that uses for loops to perform the following steps: Prompt the user to input two integers: firstNum and secondNu
    15·1 answer
  • Write a program that prompts the user for the name of two files each containing a single line that represents a decimal integerc
    11·1 answer
  • How should a Salesforce Admin fulfill those requirements? Universal Containers launches a Partner Community for their resellers
    13·1 answer
  • The most important task in developing a new computer system/app is to: a) choose the most current technologies such as operating
    5·1 answer
  • What is the definition of a nested function?
    8·1 answer
  • 1. Write the full forms of the following.
    8·2 answers
  • Tạo biến
    8·1 answer
  • How do we ensure that future technologies are fair to society?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!