1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zzz [600]
2 years ago
6

A good algorithm should have which three components?

Computers and Technology
1 answer:
laila [671]2 years ago
7 0

Answer:

a good algorithm must be able to accept a set of defined input. Output: a good algorithm should be able to produce results as output, preferably solutions. Finiteness: the algorithm should have a stop after a certain number of instructions. Generality: the algorithm must apply to a set of defined inputs.Explanation:

You might be interested in
Which of the following mountain ranges stretches from Alabama to Canada?
Vikki [24]
The Appalachian Mountains
4 0
2 years ago
Jeffery wants to identify the subject terms being used in APA PsychInfo for articles related to behavior modifications. What is
schepotkina [342]

Group of answer choices.

a. He can look for common related subject terms in a dictionary, thesaurus or encyclopedia.

b. He can look for relevant articles in the results list from a database search and scan the subject terms.

c. He can use Go-ogle Scholar to retrieve relevant articles and find common related subject terms.

Answer:

b. He can look for relevant articles in the results list from a database search and scan the subject terms.

Explanation:

A Search engine is an internet resource or service that searches for keywords or categories specified by the end user and then displays (shows) a list of website which matches or have informations similar to the query. Some examples of popular search engines are Goo-gle, Bing, Yahoo, etc.

The most efficient and effective search strategy to identify subject terms for a database search is to look for relevant articles in the results list from a database search and scan the subject terms.

In order to improve the speed of retrieval for a search engine, high frequency words such as if, or, and, at, to, etc., which are generally referred to as stop words are filtered out.

However, AND should be used to combine keywords and phrases when using a "subject search" option to search a database for relevant articles.

5 0
2 years ago
The last step on Kotter’s Eight-Step Change Model is to anchor the changes in corporate culture; to make anything stick, it must
m_a_m_a [10]

Answer:

Therefore, it is important to find opportunities to integrate security controls into day-to-day routines.

Do you believe this to be true- Yes.

In general, implementing security policies occurs in isolation from the business perspectives and organizational values that define the organization’s culture. Is this correct or incorrect? - Incorrect

Explanation:

Truly, it is important to find opportunities to integrate security controls into day-to-day routines, this is in order to minimize future security threats by formulating company-wide security policies and educating employees on daily risk prevention in their work routines. In the operational risk controls, vigilant monitoring of employees must be implemented in order to confirm that policies are followed and to deter insider threats from developing.

Flexing and developing policies as resources and priorities change is the key to operational risk controls.

These risk controls implementation in organizational security is not a one-time practice. Rather, it is a regular discipline that the best organizations continue to set and refine.

For better preparation of an organization towards mitigating security threats and adaptation to evolving organizational security needs, there must be a proactive integration of physical information and personnel security while keeping these risk controls in mind.

12. In general, implementing security policies occurs in isolation from the business perspectives and organizational values that define the organization’s culture - Incorrect.

When security policies are designed, the business perspectives and the organizational values that define the organization’s culture must be kept in mind.

An information security and risk management (ISRM) strategy provides an organization with a road map for information and information infrastructure protection with goals and objectives that ensure capabilities provided are adjusted to business goals and the organization’s risk profile. Traditionally, ISRM has been considered as an IT function and included in an organization’s IT strategic planning. As ISRM has emerged into a more critical element of business support activities, it now needs its own independent strategy to ensure its ability to appropriately support business goals and to mature and evolve effectively.

Hence, it is observed that both the Business Perspective and Organisational goals are taken into consideration while designing Security policies.

6 0
3 years ago
Advantages of machine language​
morpeh [17]

Machine Language is a language used to communicate with the Central Processing Unit (also known as the CPU)

6 0
3 years ago
What products data from corruption?<br>​
vesna_86 [32]

Answer:

Types of data corruption

Data corruption refers to errors in computer data that occur during writing, reading, storage, transmission, or processing, which introduce unintended changes to the original data.

...

Data Integrity Field.

ECC memory.

Forward error correction.

List of data recovery software.

Parchive.

RAID.

Reed-Solomon error correction.

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • What is one way to process your thoughts about the information you are reading?
    14·2 answers
  • Which principle of animation deals with imparting a unique identity to the animated character?
    5·1 answer
  • True or False. When used with the cout object, the endl stream manipulator advances the cursor to the next line on the computer
    6·1 answer
  • Which of the following is true about scalability?
    9·1 answer
  • A major concern about ESP claims is that proponents explain both the positive and negative findings. By explaining the negative
    14·1 answer
  • Which expression is equivalent to 3x + 3x + 3x?<br><br> From Performance Matters
    11·2 answers
  • HELP PLZZZZZZ
    10·1 answer
  • ACTIVITY NO. 5 (DAY 5) FACT OR BLUFF. Write Fact if the statement is correct and write Bluff if it is incorrect.
    12·1 answer
  • MODERATOR DELETE MY ACC
    8·2 answers
  • Fort Nite is the best u can’t say it’s not
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!