1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikitich [7]
3 years ago
11

What is algorithm and how does it works​

Computers and Technology
2 answers:
andre [41]3 years ago
5 0

Answer:

An algorithm, for the non-programmers among us, is a <u><em>set of instructions that take an input, A, and provide an output, B, that changes the data involved in some way</em>.</u> Algorithms have a wide variety of applications. In math, they can help calculate functions from points in a data set, among much more advanced things.

Explanation:

hope it helps

goldfiish [28.3K]3 years ago
3 0

Answer:

An algorithm is a set of instructions for the nonprogrammer among us, taking an input, A, and giving an output, B, which in some way modifies the data involved. A vast array of applications exist for algorithms. In math they can help to calculate functions between much more complicated things from points in a data collection.

Explanation:

You might be interested in
Match the description to the step in troubleshooting.
Digiron [165]
It should go 4 5 3 2 1
5 0
4 years ago
What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b
Paraphin [41]

Answer:

Answered below

Explanation:

Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.

Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.

Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.

3 0
3 years ago
Write a program that prompt the user to enter a bank balance. The balance entered by the user is read into a variable named bala
IRINA_888 [86]

Answer:

ertyuiopoijuhgfdsa hiyoufun tresdfghytrefgytredfg

Explanation:

look for the words

4 0
3 years ago
A data center designer requested additional lighting for the entrance to the data center as well as the removal of a object whic
Ira Lisetskai [31]

Answer:

SURVEILLANCE-SPECIFIC DESIGN.

Explanation:

Defensible space offers a series of architectural guidelines that can be used in the design of new urban residential complexes to promote both the residential group’s territorial claim to its surroundings and its ability to conduct natural surveillance. The designs are: site interrelationship design, site design, street design and surveillance-specific design.

Surveillance-specific design can be used to increase general visibility by providing adequate lighting, by reducing or eliminating physical barriers to visibility, and by the visibility-promoting location of key areas (entrances, lobbies, elevator waiting areas, parking areas e.t.c.) so as to be directly visible from as many viewpoints as possible.

Since the data center designer requested additional lighting for the entrance to the data center as well as the removal of a object which is blocking security's view of the entrance, then it is an example of SURVEILLANCE-SPECIFIC DESIGN.

6 0
3 years ago
I have asked that my account that i have been charged all summer long be canceled. i need a return call today to talk to someone
Leno4ka [110]

There is a considerable potential that it could be altered for editing purposes if the aforementioned replay was recorded using editing software.

<h3>What is editing software?</h3>
  • On a non-linear editing system, video editing software, also known as a video editor, is used to execute post-production video editing of digital video sequences.
  • Both analog video tape-to-tape online editing devices and conventional flatbed celluloid film editing tools have been superseded by it.
  • Any software program that can edit, modify, produce, or otherwise manipulate a video or movie file is referred to as video editing software.
  • With the aid of a video editor, you can chop and arrange a video to improve its flow or add effects to make it more visually appealing.

To learn more about editing software, refer to:

brainly.com/question/9834558

#SPJ4

4 0
2 years ago
Other questions:
  • Is it possible to increase watch hours for a channel by making a playlist out of your videos for people to watch? Will it boost
    13·1 answer
  • To alter just one character in a StringBuilder, you can use the ____ method, which allows you to change a character at a specifi
    5·2 answers
  • Given a UNIX file system with 1024-byte blocks, how many disk accesses are needed to access bytes 2500-2503 of a file (assume th
    12·1 answer
  • PHP is based on C rather than ______.
    5·1 answer
  • The statement which assigns value to variable is called a........................statement in c++
    11·1 answer
  • Which of the following is a major difference between XSS attacks and remote code exploits?
    15·1 answer
  • What is cloud computing?
    9·1 answer
  • You are adding more features to a linear regression model and hope they will improve your model. If you add an important feature
    7·1 answer
  • What defines the scope of a project?
    5·1 answer
  • The local Driver's License Office has asked you to write
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!