1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lina2011 [118]
3 years ago
10

Write any two rules for writing algorithm​

Computers and Technology
1 answer:
inessss [21]3 years ago
5 0

Answer:

1) = input and output should be defines precisely

2) = it shouldn't include computer code

You might be interested in
Respecting yourself and others, educating yourself and connecting with others, and protecting yourself and others are all aspect
____ [38]

Answer: kind person

Explanation:

7 0
3 years ago
Read 2 more answers
Which of the following is NOT a destination?
prisoha [69]

Answer: Hi im Sergeant von im here to help you in any way ma'm;)

I would think it would be the last one ( A SCANNER ) i hope this maybe the right answer if not im sorry at least i gave it a shot

Explanation:

The last one " a scanner " is the one i would choose ma'm it seems logic the the Question and seems too fit in with the rest ;)

Have a good day ma'm

5 0
3 years ago
Read 2 more answers
History of computer from difference engine <br>​
harkovskaia [24]

Answer:

Charles Babbage (1791-1871), computer pioneer, designed two classes of engine, Difference Engines, and Analytical Engines. Difference engines are so called because of the mathematical principle on which they are based, namely, the method of finite differences.

Explanation:

4 0
2 years ago
Read 2 more answers
Explain the security mechanisms available for a database and how the data will be protected.
Stolb23 [73]

Answer: Views, unauthorized access, encryption are some of the security mechanisms.

Explanation:

The database of any application or software contains all the important data, therefore it is utmost necessary to protect the data from falling into dangerous hands. Most databases use authentication measures in form of passwords or bio metrics to avail access. Besides these users can use views to see the data but cannot change anything into the database. Some databases also use encryption systems to encrypt the passwords for better safety. There are some databases which grants user with two types of privileges such as system and  object privileges, whereby with system privileges one can change the system environment variables.

8 0
3 years ago
For the following data, what is the average number of cycles per instruction?
Komok [63]

Answer:

2.82

Explanation:

The computation of the average number of cycles per instruction is shown below:

=  Arithmetic/logical operations × frequency cycles + Register load operations ×  frequency cycles  + Register store operations  ×  frequency cycles + Unconditional branch instructions ×  frequency cycles + Conditional branch instructions ×  frequency cycles

=  45% × 1 + 18% × 5 + 10% × 2 + 7% × 1 + 20% × 6

= 0.45 + 0.9 + 0.2+  0.07 + 1.2

= 2.82

7 0
3 years ago
Other questions:
  • Tower defense is included under which genre of game
    15·2 answers
  • This assignment is to read from an input file and process the data for a group of people. Your program calculates the interest a
    5·1 answer
  • Which of the following correctly describes the reason for quality customer service?
    15·2 answers
  • You can put a small level on your camera to help keep the horizons straight? TRUE OR FALSE
    14·2 answers
  • Write a program to calculate and return total surface area of a box using FUNCTION _END FUNCTION.​
    15·1 answer
  • In modern web design, color, font, font size, and style should be declared using:
    5·1 answer
  • Choose the answer that best completes the
    8·2 answers
  • Write down the stages in the information prcessing cycle in correct order​
    5·1 answer
  • Karin realized that a song takes up a lot more space on her computer than the lyrics of the song typed out in ms word document .
    12·1 answer
  • What is normalization?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!