1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lutik1710 [3]
3 years ago
11

Explain whether you think that algorithms should be protected under copyright law, and therefore whether it is possible to ‘stea

l' them?
Computers and Technology
1 answer:
valentinak56 [21]3 years ago
6 0

Answer:

no no and no you cant steal them

Explanation:

You might be interested in
Evaluate the following expression with precedence of operator:<br> ​ X = 2* 3/ 5 + 10 //3 – 1
Mamont248 [21]

Answer:  3.5333 repeating

Explanation:

2 times 3/5 equals 1.2, 1.2 plus 10 equals 11.2, 11.2 divided by 3-1 equals 3.5333 repeating i think.

4 0
3 years ago
The Bellman-Ford algorithm for the shortest path problem with negative edge weights will report that there exists a negative cyc
Feliz [49]

Answer:

- Iterate over the Bellman-Ford algorithm n-1 time while tracking the parent vertex and store in an array.

- Do another iteration and if no relaxation of the edges occurs in the nth iteration then print of return "There are no negative cycle".

- Else, store the vertex of the relaxed edge at the nth iteration with a variable name.

- Then iterate over the vertexes starting from the store vertex until a cycle is found then print it out as the cycle of negative weight.

Explanation:

The Bellman-Ford algorithm can be used to detect a negative cycle in a graph. The program should iterate over the algorithm, in search of a relaxed edge. If any, the vertex of the specified edge is used as a starting point to get the target negative cycle.

3 0
3 years ago
. In an if/else statement, the if part executes its statement or block if the expression
e-lub [12.9K]

Answer:

The answer to this question can be given as

true, false.

Explanation:

As we know that If-else statement is a part of the all programming language. If block always execute true value. The syntax of if-else statement can be given as

Syntax:

if()

{

//code for condition true.

}

else

{

//code for condition false.

}

Example:

#include <stdio.h>

int main()

{

int a=10;  //declaring integer variable a.

if(a==10) //check condition

{

/*

starting of if block in( ) we pass condition for check for example

(a==10) where a is integer a variable.

*/

printf("value match..");    //true part

}

else

{

printf("value not match..");    //false part

}

 return 0;

}            

In the above example, a is an integer variable we assign value to it. and check the value by if-else statement. if the value is true it executes value match or print else part that is value not match.

So the answer to this question is true, false.

4 0
4 years ago
Which statement best describes desktop publishing?
Naddik [55]

Answer:

the process of designing and laying out printed material

Explanation:

The other answers were wrong. Option A is correct

4 0
3 years ago
Select the correct answer.
AveGali [126]

Answer:A

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • The set of Visual Basic instructions that tells an object how to behave after an action by the user (such as clicking a button)
    6·1 answer
  • Your computer is slowing down because you’ve started a process that is taking most of the memory and CPU resources. Which of the
    7·1 answer
  • Which of these is important to consider before believing health or fitness information you find online? Where the information wa
    5·2 answers
  • "Common knowledge" must always be credited or else it is considered plagiarism?<br> True<br> Fales
    5·1 answer
  • . Does Zuckerberg believe in the thought that “the endpoint is when you sell the
    15·1 answer
  • An ARP broadcast is sent to the special MAC address _______.
    9·1 answer
  • Encryption has a remarkably long and varied history. Spies have been using it to convey secret messages ever since there were se
    7·1 answer
  • Which term describes the order of arrangement of files and folders on a computer
    11·1 answer
  • What would the math equation x = y create?
    9·1 answer
  • Which one of the following document types would you not use the Microsoft Excel program to create?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!