1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatyana61 [14]
3 years ago
9

A Program is an Algorithm – a set of directions for the computer to follow. True False

Computers and Technology
1 answer:
d1i1m1o1n [39]3 years ago
5 0

Answer:

True

Explanation:

You might be interested in
Some request lists might cause the disk scheduler to act the same when the three different algorithms are run. Create a request
storchak [24]

Answer:

35, 25, 50, 75, 95

Explanation:

List of five track numbers that will cause all three algorithms to visit the same tracks in the same order are -

35

25

50

75

95

Please go to attachment for the diagram how these 5 tracks will be traversed by various algorithms.

All the algorithms traverse in the order 35 -> 25 -> 50 -> 75 -> 95

7 0
4 years ago
Middleware for cloud database applications is commonly written as ____—short sections of code written in a programming or script
Ostrovityanka [42]
<span>Middleware for cloud database applications is commonly written as scripts—short sections of code written in a programming or scripting language that are executed by another program. A script language is used for server side scripting language that can change a specific data on the server. Examples of these are PHP, JSP, Perl, Python, etc.</span>
5 0
4 years ago
In which situations would a text-to-speech tool be useful? Check all that apply. A reader needs to hear a word pronounced. O A s
ExtremeBDS [4]

Answer:

I'm not sure but I believe it would be A

Explanation:

This answer can't really be accurate as the reason can change for anyone.

8 0
3 years ago
Read 2 more answers
The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.
andrew-mc [135]

Answer:

Option c: Heuristic

Explanation:

Heuristic scanning is a form of computer virus detection analysis that screen for the suspicious characteristic of the program which maybe a virus. Heuristic scanning is designed to detect those new computer virus, unknown virus or the modified version of the known virus.

To perform heuristic scanning, a weigh-based evaluation algorithm will be adopted to estimate the likelihood of the current scanned program behaves like a virus which can pose a computer threat. If it exceeds a threshold level, an alarm will be triggered.

3 0
3 years ago
What are expansion cards used for?​
S_A_V [24]

Answer:

an expansion card is a PCB that fits into an expansion slot on a desktop computer. An expansion card is used to give a computer additional capabilities, such as enhanced video performance via a graphics card.

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • To indent the first line of a paragraph which key should you use
    13·2 answers
  • A main document in a mail merge contains data, such as names and addresses.
    12·1 answer
  • Which of the following statements is/are true by definition.
    5·1 answer
  • 11.19 (Constructor Failure) Write a program that shows a constructor passing information about constructor failure to an excepti
    6·1 answer
  • The use of _______________ can validate input responses from clients and prevent certain attack methodologies
    14·1 answer
  • When a cells number format is “time” it will show a value in what format
    5·1 answer
  • Import java.util.ArrayList;
    14·1 answer
  • Well I ended up figuring it out
    7·1 answer
  • A__ is a part of a GUI that allows a specific type of interaction with the user.
    14·1 answer
  • Legends are titles given to three-axis X, Y, and Z-axis. True or false?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!