1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pantera1 [17]
3 years ago
6

How do you convert an algorithm to make it possible for a computer to read

Computers and Technology
1 answer:
STALIN [3.7K]3 years ago
6 0

Answer:

Answer A. You write it using a programming language.

Explanation:

You might be interested in
A human would do a better job determining the shortest route between twenty cities than a computer.
77julia77 [94]

Answer:

that is false I think so it true

8 0
3 years ago
Which of the following events happened first?
horrorfan [7]

Answer:

D. ARPANET was developed

Explanation:

ARPANET is an acronym for Advanced Research Projects Agency Network and it was established in 1969 by the Advanced Research Projects Agency (ARPA) of the United States Department of Defense.

ARPANET was the first wide area packet switching network for transmitting electronic data and communications between computers on a single network with a distribution functionality. The TCP/IP protocol was first implemented on the Advanced Research Projects Agency Network (ARPANET), as well as some other standard protocols such as the NCP and the 1822 protocol.

The development of ARPANET happened first in the evolution of the internet.

E-mail is an acronym for electronic mail and it was invented by Ray Tomlinson in 1971; World Wide Web was created by Tim Berners-Lee in 1990; Web 2.0 evolved in 1999.

6 0
4 years ago
Create a linked list for library patrons. Put at least 8 patrons in the list. (You should hard code this data.) Ask for a person
Evgesh-ka [11]

Answer:

Explanation:

#include <bits/stdc++.h>

using namespace std;

/* Link list node */

class Node

{

public:

string Name;

long Library_card_number;

string Street;

string City;

long Zip;

Node* next;

};

/* Given a reference (pointer to pointer) to the head

of a list and an int, push a new node on the front

of the list. */

void push(Node** head_ref,string name,long lcn,string street,string city,long zip)

{

/* allocate node */

Node* new_node = new Node();

/* put in the key */

new_node->Name = name;

new_node->Library_card_number = lcn;

new_node->Street = street;

new_node->City = city;

new_node->Zip = zip;

/* link the old list off the new node */

new_node->next = (*head_ref);

/* move the head to point to the new node */

(*head_ref) = new_node;

}

/* Checks whether the value x is present in linked list */

Node* search(Node* head, string x)

{

Node* current = head; // Initialize current

while (current != NULL)

{

if (current->Name == x)

return current;

current = current->next;

}

return NULL;

}

/* Driver program to test count function*/

int main()

{

/* Start with the empty list */

Node* head = NULL;

int x = 21;

/* Use push() to construct below list

14->21->11->30->10 */

push(&head, "Joe",1,"hippy Street","Bay area",2009);

push(&head, "Marie",2,"lippy street","san jose",2010);

push(&head, "Harry",3,"gippy Street","Bay area",2009);

push(&head, "Ashish",4,"dippy street","san jose",2010);

push(&head, "Zuck",5,"sippy Street","Bay area",2009);

push(&head, "Gates",6,"kippy street","san jose",2010);

push(&head, "Page",7,"pippy Street","Bay area",2009);

push(&head, "Brin",8,"dippy street","san jose",2010);

string name;

cout<<"Enter name of the person to search: ";

cin>>name;

Node* z = search(head,name);

if(z!=NULL){

cout<<"\nPerson found in the list"<<endl;

cout<<"Name: "<<z->Name<<endl;

cout<<"Library Card Number: "<<z->Library_card_number<<endl;

cout<<"Street: "<<z->Street<<endl;

cout<<"City: "<<z->City<<endl;

cout<<"Zip: "<<z->Zip<<endl;

}else{

cout<<"No person found with the name "<<name<<endl;

}

return 0;

}

7 0
3 years ago
Write a C program to implement a command called ​displaycontent ​that takes a (text) file name as argument and display its conte
Zanzabum

Answer:

/*

Student: Hugo Meza

Date: February 15, 2019

Description: This program mimic the cat command from Linux. Checks whether the source file

has the right permissions, and then writes in the console its content.

*/

#include <stdio.h>

#include <fcntl.h>

#include <unistd.h>

#include <errno.h>

int hasPermission(char *filepath){

int returnval;

// Check file existence

returnval = access (filepath, F_OK);

if(errno == ENOENT){

printf ("%s does not exist\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n", filepath);

return 0;

}

// Check read access

returnval = access (filepath, R_OK);

if(errno == ENOENT){

printf ("%s does not have read access\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n",filepath);

return 0;

}

// Check write access

returnval = access (filepath, W_OK);

if(errno == ENOENT){

printf ("%s does not have read access\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n",filepath);

return 0;

}

return 1;

}

int main(int argc, char* argv[]){

if(!argv[1]){

printf("Error. Specify file to open\n");

return 0;

}

int fd;

char *fp = argv[1], content[fd];

if(hasPermission(fp) == 0)

return 1;

fd = open(fp, O_RDONLY);

int bytes = read(fd,content,sizeof(content)-1);

write(1, content, bytes);

close(fd);

return 0;

}

Explanation:

7 0
3 years ago
Do you think computers are smart machines?​
LekaFEV [45]

Answer:

sort answer yes

Explanation:

computer are smart machines help us do good things helping humans communicate and help spread information that can help impact a work. Computers can even have more information than us which is really crazy even tho we created computers

idk if that helps

8 0
4 years ago
Other questions:
  • I need help making this table in html code I have some of chart done but idk where to go after the 6:30pm part
    13·1 answer
  • Which remote access configuration option should you choose if you want mobile users to be able to make a secure connection to th
    9·2 answers
  • Use BlueJ to write a program that reads a sequence of data for several car objects from an input file. It stores the data in an
    5·1 answer
  • Which of the following is the most significant outcome of the formation of the SMPTE?
    6·2 answers
  • What do commercial websites use to estimate a visitor's age, gender, and zip code?
    10·1 answer
  • Florida law requires every child blank years of age or younger use a crash tested federally be approved child restraint device
    5·2 answers
  • Please tell fast plzzzzzzzz​
    11·2 answers
  • The letters G, H, T, Y, B, and N are what type of keys?
    15·2 answers
  • 3. Output the following:<br>a.<br>21%4​
    12·1 answer
  • Exactly how many times must the merge function call each of read and write to merge two arrays of size n/2 into an array of size
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!