1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksivusya [100]
3 years ago
8

Different algorithms can be made to complete the same task in different ways.

Computers and Technology
2 answers:
musickatia [10]3 years ago
7 0

Answer:

True hope this helps you and everyone!

Ivenika [448]3 years ago
5 0

Answer:

as long as it's the same problem

You might be interested in
Identify two real-world examples of problems whose solutions do scale well
stellarik [79]

Explanation:

We should see scaling well as referring to problems that can well be solved using computation. Two real-world examples are:

  • problems involving finding the largest or smallest of several lists of numbers: Usually, a simple program executed to lookup the data set to determine which number fits the properties needed.
  • problems involving equations: By computing the variables (x, y, etc) that make up the equation, and the operations (eg, addition, division) to be performed on the variables the problem can be solved well.
3 0
3 years ago
A DNS server on your client's network is receiving a large number of DNS queries from what appears to be a workstation on their
drek231 [11]

Answer:

The answer is reflective DNS attack

Explanation:

Reflective DNS Attack is used in many distributed DDoS attacks to knock down an internet pipe. The attack is divided in two stages: first  the attacker sends lots of requests to one  or more legitimate DNS servers  while using spoofed source IP of the target person, and then, in the second stage, the DNS server receiving the semi-legitimate requests replies to the spoofed IP, thereby unknowingly lauching an attack on the target computer with responses to requests never sent by the victim.

4 0
4 years ago
What IEEE 802.11 wireless standard supports devices only in the 5GHz range with speeds up to 4.9Gb/s because of accepting data f
yKpoI14uk [10]

The answer is 802.11ac  

802.11ac is a type if IEEE 802.11 wireless standards that supports Multiple Input, Multiple Output antennas on sending and receiving data. This type of wireless connection supports 2.4GHz signal or frequency and data speed transfer up to 4.9Gbps. Each device or antenna can run up to 400Mbps each and the maximum device it can handle is up to 8 antennas.

8 0
3 years ago
A method of using a square grid of imaginary lines to describe part features is known as _____.
Fiesta28 [93]

Answer:

The answer is "Prime Meridian".

Explanation:

The process, that describes an imaginary line in part these features is known as Prime Meridian. It is also known as 0° Longitude in which Longitude is a statistical vector that determines the location to East to West and points on the surface of the Earth or of a paradisaical body surface, and 0° Longitude is the line that describes the Equator and divides the world into two equal quadrants.

4 0
3 years ago
Write a program that keeps taking integers until the user enters in python
soldi70 [24.7K]

int main {

//variables

unsigned long num = 0;

std::string phrase = " Please enter your name for confirmation: " ;

std::string name;

//codes

std::cout << phrase;

std::cin>> name;

while ( serial.available() == 0 ) {

num++;

};

if ( serial.avaliable() > 0 ) {

std::cout << " Thank you for your confirmation ";

};

};

3 0
3 years ago
Other questions:
  • What is binary coded decimal,EBCD and ASCII
    15·1 answer
  • There are three required elements needed to connect to the internet: internet service provider, hardware, and __________.
    13·1 answer
  • A camera in manual mode means of the camera will make all the adjustments for the photographer
    8·1 answer
  • A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considera
    8·1 answer
  • TOT al<br>Name TWO examples of these settings and utilities. (2)​
    12·1 answer
  • yo guys go sub to my channel road to i guess 20 or 30 my yt channel is called The Golden StreamerYT i have 16 subs we are almost
    10·2 answers
  • What is the definition of shape
    14·2 answers
  • The First Web page you will see every time you launch the Web Browser Application is called​
    11·1 answer
  • Emily is deciding whether to buy the same designer jacket her friends have. The jacket is much more expensive than a similar one
    8·2 answers
  • 8. Software ____ are individual programs that can be purchased, installed, and run separately, but extract data from the common
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!