1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sammy [17]
3 years ago
5

24 POINTS!!! Why are Sequences, Selection, and Iteration building blocks of algorithms?

Computers and Technology
1 answer:
lesya692 [45]3 years ago
8 0

Answer:

An algorithm is a step by step process that describes how to solve a problem in a way that always gives a correct answer.

An algorithm is made up of three basic building blocks: sequencing, selection, and iteration.

Sequencing: An algorithm is a step-by-step process, and the order of those steps are crucial to ensuring the correctness of an algorithm.

Selection: Algorithms can use selection to determine a different set of steps to execute based on a Boolean expression.

Iteration: Algorithms often use repetition to execute steps a certain number of times or until a certain condition is met.

Explanation:

You might be interested in
Are all the computer users known as programmer ​
Evgesh-ka [11]

Answer:

Nope

Explanation:

programmers are diff

6 0
2 years ago
Which of the following is true of how packets are sent through the Internet?
astra-53 [7]

Answer:

It is A: Packet metadata is used to route and reassemble information travelling  through the internet.

Explanation:

Step 1: The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops. Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee

Step 2: Entering the network

Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee.

Step 3: Taking flight

The next hop delivers the packet to a long-haul provider, one of the airlines of cyberspace that quickly carrying data across the world.

Step 4: BGP

These providers use the Border Gateway Protocol to find a route across the many individual networks that together form the Internet.

Step 5: Finding a route

This journey often takes several more hops, which are plotted out one by one as the data packet moves across the Internet.

Step 6: Bad information

For the system to work properly, the BGP information shared among routers cannot contain lies or errors that might cause a packet to go off track – or get lost altogether.

Last step: Arrival

The final hop takes a packet to the recipient, which reassembles all of the packets into a coherent message. A separate message goes back through the network confirming successful delivery.

8 0
3 years ago
Read 2 more answers
The letters a, e, i, o and u are the only vowels. Write a function named vowelUseDict() takes a string t as a parameter and comp
Andru [333]

Please specify the programming language.


3 0
3 years ago
Please answer as soon as possible
kondaur [170]

its the first one x 3/14 bc 2/7 times 3/4 makes 6/28. 6/28 simplified is 3/14

8 0
3 years ago
Suppose the sender wants to send the following bit stream by using bit stuffing. What would the sender transmit if the following
Helen [10]

The purpose of bit stuffing is used as a delimiter to mark the end of one frame and the beginning of the next frame.

<h3>What is Bit Stuffing?</h3>

This refers to the use of one or more information bits in order to break up the message for easy synchronization.

The parts of a frame are:

  1. Frame header
  2. Payload field
  3. Trailer
  4. Flags.

<h3>What is a Flag?</h3>

This is a bit pattern that is used to define the start and end bits in a given frame and the 8-bit pattern 01111110 as the flag is commonly used.

Hence, we can see that your question is incomplete so I gave you a general overview to help you have a better understanding of the concept.


Read more about bit stuffing here:

brainly.com/question/12949292
#SPJ1

7 0
2 years ago
Other questions:
  • how to write a function "void funct()" which will accept a string from the user as input and will then display the string backwa
    11·1 answer
  • What is the next series of dragon ball super
    6·2 answers
  • A ____ is a theoretical model of computation that includes a (conceptual) tape extending infinitely in both directions.
    13·1 answer
  • "where is a cookie that is created during a web site visit​ stored?"
    9·1 answer
  • Vhich economic impact of computers was mentioned in this lesson?
    6·1 answer
  • _ models are non visual ways of communicating how someone thinks about something in the natural world
    12·1 answer
  • If you notice files being transferred to or from your computer a. Simply close the window c. Tell the lab instructor b. Open a n
    11·2 answers
  • Anyone wanna join zoo m???????​
    10·2 answers
  • You are planning to write a guessing game program where the user will guess an integer between one and 20. Put the commented ste
    12·1 answer
  • What is a program that includes a function parameter capable of doing?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!