1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nesterboy [21]
3 years ago
6

Think about the five steps to writing an algorithm. Why is each step necessary?

Computers and Technology
2 answers:
7nadin3 [17]3 years ago
6 0

Answer:

person above me is correct for edge 2021

Explanation:

Dmitry [639]3 years ago
3 0

Answer:

There are many ways to write an algorithm. Some are very informal, some are quite formal and mathematical in nature, and some are quite graphical. The instructions for connecting a DVD player to a television are an algorithm. A mathematical formula such as πR2 is a special case of an algorithm. The form is not particularly important as long as it provides a good way to describe and check the logic of the plan.

The development of an algorithm, a plan is a key step in solving a problem. Once we have an algorithm, we can translate it into a computer program in some programming language. Our algorithm development process consists of five major steps.

Explanation:

Step 1: Obtain a description of the problem.

Step 2: Analyze the problem.

Step 3: Develop a high-level algorithm.

Step 4: Refine the algorithm by adding more detail.

Step 5: Review the algorithm.

You might be interested in
Unit testing:_________. A. provides the final certification that the system is ready to be used in a production setting. B. incl
NARA [144]

Answer:

Option (C) is the correct option to the following question.

Explanation:

The following option is correct because the unit testing is the process of testing a single unit of software at a time, which means the testing of each and every program separately.

In simple words, Unit testing a process of testing in which the developer executes the single method or a function, statements or loop in the program of the software to checking is it working fine or not.

7 0
2 years ago
List three things to be safer online.
kenny6666 [7]

Answer:

1. do not give out your age

2. don't use your real name unless you are supervised

3.dont put all your information out there

5 0
2 years ago
What kind of command can you access from the mini toolbar in Microsoft Word?
qaws [65]
Paint,calculator,camera,snipping tool,file,store,and photis

5 0
2 years ago
State the function of a URL in a website​
mihalych1998 [28]

Answer:

It's purpose is to access a webpage.

Explanation:

A URL contains detailed information on the webpage such as, the domain name, protocol, and path. This information directs the browser to the desired page.

3 0
3 years ago
What are the assignable addresses for the 12th subnet with the network address of 220.100.100.0 and the number of needed subnets
bogdanovich [222]

Answer:

C. 220.100.100.45 to 220.100.100.46

Explanation:

The Classless IP subnetting of 220.100.100.0 begins from the fourth octet of the IP address. To get 45 subnet mask, it uses 6 bits from the fourth octet, which approximately give 64 subnets, while the remaining 2 bits are used for host IP addressing.

The useable host IP addresses are gotten from the formula '2^{n}-2', with n=2 bits.

useable host IP addresses = 2^2 - 2 = 2 addresses per subnet.

While the 12th subnet is 12 x 2^2 = 44.

This means that the 12th subnet mask starts with 220.100.100.44 (as the network address) and ends with 220.100.100.47 as broadcast IP address, while '.45' and '.46' are the assignable addresses of the subnet.

5 0
2 years ago
Other questions:
  • A software programâs _________ indicates what can legally be done with that program.]
    5·1 answer
  • Dana downloads music into her computers random access memory, or ram, without authorization. this is?
    15·1 answer
  • In the single-site processing, single-site data (SPSD) scenario, all processing must be done on the end user's side of the syste
    10·2 answers
  • How to get out of compatibility mode in word?
    15·1 answer
  • Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an
    8·1 answer
  • Write a for loop to print all NUM_VALS elements of array hourlyTemp. Separate elements with a comma and space. Ex: If hourlyTemp
    11·1 answer
  • What is ana absolute adress
    11·1 answer
  • What makes the huns a formidable force for the roman empire?
    5·1 answer
  • Who here has a crush on jk from bts but feels more mature than him
    10·2 answers
  • Which engineer may design a GPS for a vehicle?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!