1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andriy [413]
3 years ago
9

Which of the following is true about algorithms?

Computers and Technology
1 answer:
Artist 52 [7]3 years ago
8 0

Answer:

C

Explanation:

A is false because they usually <em>are</em> used to solve problems

B is false because many different algorithms can solve a problem!

C - true

D is false because humans can write an algorithm.  

You might be interested in
class student_record { public: int age; string name; double gpa; }; Implement a void function that has five formal parameters: a
Setler79 [48]

Answer:

void delete_record(student_record *arr, int &size, int age, string name, double gpa) {

int index = -1;

if (arr != NULL && size > 0) {

for (int i = 0; i < size; ++i) {

if (arr[i].age == age && arr[i].name == name && arr[i].gpa == gpa) {

index = i;

break;

}

}

}

if (index != -1) {

for (int i = index; i < size - 1; ++i) {

arr[i] = arr[i + 1];

}

size--;

}

}

8 0
3 years ago
How can touch typing increase productivity of a business?
Sladkaya [172]

Answer:

Increasing your typing speed will improve your productivity and save you time. Having a good typing speed will improve your job satisfaction.

Explanation:

hope his helps

3 0
2 years ago
Read 2 more answers
Which of the following calculates to 10?
nikdorinn [45]
The third one because u have to do parenthesis
7 0
3 years ago
Read 2 more answers
porfavor no es una pregunta dificil, nisiquiera es de una tarea, hace poco mi computador windows 10 no recibia el sonido de mis
amid [387]

Answer:

he intentado encender la computadora mono

Explanation:

6 0
3 years ago
An attacker captures an encrypted message. he tries decrypting with every possible key until the decryption process reveals a se
strojnjashka [21]
Brute force. He's not using any information to mathematically derive information about the key, just trying all possibilities. With modern key sizes this is typically not a successful approach.
8 0
3 years ago
Other questions:
  • Which major and minor keys have no sharps or flats apex?
    5·2 answers
  • 1) Put the following in order from smallest to largest A) 1,500,000 bytes B) 2,000 kilobytes C) 0.01 petabytes D) 1 Terabyte E)
    8·1 answer
  • What steps do you need to take to register
    14·1 answer
  • _____ separation strategies (e.g., attacking and sabotaging others) are used by those for whom co-cultural segregation is an imp
    5·1 answer
  • Matching: match each step with its correct sequence number. This question tests whether you know the order in which a CPU perfor
    14·1 answer
  • What are the features of Cobol language that make it suitable for programming business applications.
    6·1 answer
  • What is the reason of non-deterministic (indeterminate) behavior of concurrent programs?
    9·1 answer
  • A computer connected to the Internet that asks for data is a(n) ________. Select one: A. server B. client C. aggregator D. surro
    8·1 answer
  • Stacy is in the process of creating a storyboard for her personal website, but she is unable to decide which storyboarding techn
    13·1 answer
  • Employing the use of a(n) <br> will help you manage a STEM project.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!