Which of the following are characteristics of algorithms? Choose all that apply. They take a step-by-step approach to performing a task. They’re made up of Instructions posted on a website. They break the task into manageable steps. They identify the tasks that will repeat. They can be written in a computer language to create a program for a computer to follow.

Answers

Answer 1

Answer:

They take a step-by-step approach to performing a task.

They break the task into manageable steps.

They identify the tasks that will repeat.

They can be written in a computer language to create a program for a computer to follow.

Explanation:

An algorithm is made up of a series of instructions that have a start point that eventually culminates in an endpoint. It is used in calculations and data processing. Some of the characteristics of algorithms include;

1. They take a step-by-step approach to performing a task. There are well-defined tasks that pass through a series of successive steps before the final culmination.

2. They break the task into manageable steps. There are definite manageable steps that tasks must be broken into to ensure successful execution.

3. They identify the tasks that will repeat and execute them when the program is reading.

4. They can be written in a computer language to create a program for a computer to follow.

Answer 2

Answer:

A). They take a step-by-step approach to performing a task.

C). They break the task into manageable steps.

D). They identify the tasks that will repeat.

E). They can be written in a computer language to create a program for a computer to follow.

Explanation:

I just did the Assignment on EDGE2022 and it's 200% correct!

Which Of The Following Are Characteristics Of Algorithms? Choose All That Apply. They Take A Step-by-step

Related Questions

Which single keyboard character represents any single character except in a new line in a regular expression in Linux?

Answers

That character is '.' (dot).

Before school, Kyle could not find his cell phone. Kyle tells his mom that he's already looked everywhere. Mom knows that Kyle sometimes looks at his phone in bed before falling asleep. She decides to look under his bed and finds the phone. What decision-making method did Kyle's mom most likely use?

Answers

Answer:

deductive decision-making strategy

Explanation:

In this scenario, it seems that Kyle's mom is most likely using a deductive decision-making strategy. This is when the individual goes through the process of reasoning from one or more statements (premises) in order to reach a logical conclusion. Which in this case Kyle's mom knew that Kyle sometimes sleeps with his phone next to him and that it there is space where it can fall. Using these two premises she deduced that the phone is most likely under the bed.

Answer:

Intuitive

Explanation:

By the way I am not sure this is just what I put and it doesn't tell me the correct answers.

In the context of IT jobs in the information systems field, a ____ is typically responsible for providing network and cybersecurity.

Answers

Answer:

Network Administrator or Network Security Engineer

Explanation:

This seems like an excerpt from a textbook or article, but in the workplace, usually, the network administrator or a network security engineer are responsible for providing network and cybersecurity resources.

What is the underlying complexity decimal numbers were used to represent. How were decimal numbers helpful in designing a system to represent text in bits?

Answers

Answer:

The underlying complexity decimal numbers were used to represent are bits, the decimal numbers were helpful in designing a system to represent text in bits because it is easier to read and it separates different texts.

Explanation:

Mobile device apps that enable users to pay for things or check-in to hotels or venues use _________ technology. Select one: a. GPS b. GIS c. TCP/IP d. NFC

Answers

Answer:

ip

vgfjffffffffvfdxx

Explanation:

fsxqwvetsgsrwfuxhsrwctsdqccdhvxrsbx7shgxfrxvshxrc

As you begin to develop a software application, what is one of the most helpful tools to ensure a quality product?

variable processing chart

central processing output chart

syntax and tags chart

input processing output chart

Answers

Input processing output chart

PLEASE HELP !!!!!!!!!!

An assignment my gaming and animations teacher gave me said to explain (insert game)’s objectives, operation, obstacles, and outcomes. I don’t know what an operation means here. Please help

Answers

Answer:

Operation means what does the game do? What is the purpose. If you press left arrow key what happens...etc. That is what operation is in "gaming" sense.

Hope i helped!

Which of the following is not a concern that has come out of the widespread adoption of the Internet?



Censorship of information


Increased anonymity


Selecting the correct browser to use for the sites you want to visit


Unauthorized sharing of copyrighted information

Answers

Answer:

The correct option is;

Selecting the correct browser to use for the sites you want to visit

Explanation:

Censorship of information is the subduing of information based on the consideration of such information being harmful or inconvenient

Increased anonymity

Making an individual anonymous which is one of the capabilities of the internet, is seen as encouraging unethical behavior and promoting discussions which are deemed uncivil in a commonly shared space online.

Unauthorized sharing of copyrighted information

The sharing and distribution of copyrighted material is against the law but it is a common occurrence and in various formats online

Out of the given options, selecting the correct browser to use for the sites you want to visit is the one that is not a concern.

CLS
INPUT "Enter your marks in computer": CS
C>40 THEN
PRINT "You are passed.
ELSE
PRINT "You are failed."
IF
END

DEBUG THE PROGRAM​

Answers

Answer:

INPUT "Enter your marks in computer";CS

IF C>40 THEN

PRINT "You are passed. "

ELSE

PRINT "You are failed."

END IF

Explanation:

see corrections above.

Does computerization improve patients outcome

Answers

Answer:

Yes, computerization improves the efficiency of patient management in medical centers.

Explanation:

In the past, hospitals or medical could only attend to patients that are present in the premises of the institution. The filing of patients was all done manually and on paper, which needed lots of paper and physical storage for the patient files.

Now, patient files are digitalized and stored in remote web servers, from which a patient's record can be pulled from any location, and medical consultation can be done remotely using computer devices and its designated applications, for doctor-patient communication.

This provides patients with the needed treatment they need where ever they are, even with no physical access to health consultation.

if an individual inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this

Answers

Answer: Spillage

Explanation:

The type of security incident is  Spillage

Spillage security incident occur when sensitive data are moved into a computer system that does not have the permission to keep and process those sensitive data.

Therefore in a situation where Spillage security incident occur it is important to immediately access the locations where  Spillage occur and delete all the spill data from the computer system.

Inconclusion The type of security incident is  Spillage.

Learn more here:

https://brainly.com/question/14481551

write a note on secondary storage​

Answers

Answer:  Storage devices are non-volatile devices. That means that when the power is removed from them, for example, when you switch your computer off, they retain their contents (unlike RAM, which is volatile – it loses its contents). You can then retrieve the contents next time you switch your computer on. Storage devices can be used to hold operating systems, applications and files, amongst other types of software. They are simply big suitcases – used only for storage. We have already seen that when you want to use an application kept on a storage device, it has to be moved to RAM before you can start using it. This applies to the operating system, your files and any other category of software. For this reason, RAM is sometimes known as Primary Memory whereas storage devices are often referred to as Secondary Storage devices.

The main disadvantage of using this device is its negative impact on network performance,resulting from the fact that any incoming signal on any of its ports is re-created and sent out onany connected ports.

a. Router
b. Switch
c. Bridge

Answers

Complete Question:

The main disadvantage of using this device is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.

Group of answer choices

a. Router

b. Switch

c. Bridge

d. Hub

Answer:

d. Hub.

Explanation:

A hub can be defined as a layer one (physical) device used for connecting various network devices such as switches and routers in a local area network (LAN). It comprises of many ports which are used for connecting segments of a local area network (LAN). Hubs are generally considered to be unintelligent because when frames are received at a port, it is then copied to every other connected port on the network.

Hence, the main disadvantage of using a hub is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.

he most important reason study habits are necessary is so students can become more popular. have academic success. improve social skills. have time for sports.

Answers

Answer:

academic success

Explanation:

studying is for your school. your welcome.

The most important reason why study habits are necessary is that students have achieved improved social skills. Thus, the correct option for this question is C.

What is the significance of study habits?

The significance of study habits is determined by the fact that increase your confidence, competence, and self-esteem. They can also reduce anxiety about tests and deadlines.

By developing effective study skills, you may be able to cut down on the number of hours spend studying, leaving more time for other things in your life.

Consistency is key when it comes to studying, so do your best to make a habit of it! It's a good idea to find a spot on campus where you feel comfortable and inspired to dive into a successful study session.

In modern times, the main objective of study habits is to become social and work for society in such a way that enhances each and every character and aspect of that.

Therefore, the most important reason why study habits are necessary is that students have achieved improved social skills. Thus, the correct option for this question is C.

To learn more about Study habits, refer to the link:

https://brainly.com/question/18949374

#SPJ6

A major advancement in electric lights was the invention of the____
light before World War II.

Answers

Answer:

A major advancement in electric lights was the invention of the fluorescent light before World War II

Explanation:

The ongoing research on phosphor coated neon tubes that produce visible white light from ultraviolet light in Europe, resulted in research programs into fluorescent lamp lighting in the U. S., which had reached demonstration stage in the mid and towards the late 1930s, such as the World's fair demonstration in New York, 1939.

The fluorescent proved to be more efficient and long lasting than the incandescent bulbs that were in use back then.

Which file sharing client component intercepts requests for resources and examines it to determine whether the resource is local or remote?

Answers

Answer:

"Redirector " is the correct response.

Explanation:

Technology that routing desktop computers (clients) demand information to the computer within a LAN. The redirector software is introduced to the Computer in something like a Windows network that intercepts or captures requests for documents as well as printers, however if necessary, direct those to just the correct connected system.

When you open as many links as you want, and still stay in the same browser window instead of cluttering your screen with multiple windows, it's called----- a Tabbed browsing b Same browsing c Decluttering browsing d Multiple browsing

Answers

Answer:

a. Tabbed browsing

Explanation:

Tabbed browsing is a feature in the browser that helps in operating several tabs at the same time. It helps in browsing different links without opening different browsers. Multiple pages can be opened and surfed at the same time in one window. Any link can be opened in a different or new tab by clicking right on the link. After this, 'open link in new tab' is to be selected and the link gets opened respectively.

Sorry if I’m asking this I’m doing a study but how exactly do hackers find your location with just your ip?

Answers

Answer:

?

Explanation:

Jack knows how to use word processors, spreadsheets, and presentation software. He also has a basic knowledge of hardware, software, and the Internet. Given this information, it can be concluded that Jack has _____ literacy.

Answers

Answer: computer literacy

Given the above information, it can be concluded that Jack has computer literacy.

What is Computer literacy?

This is known to be  defined as given knowledge and ability that a person has in the area of the use of computers and its related technology in an efficient manner.

Note that  Given the above information, it can be concluded that Jack has computer literacy.

Learn more about computer literacy from

https://brainly.com/question/20892559

#SPJ6

Which of the following STEM discoverers invented an application that uses summarization technology? Fedkiw Hawking D’Aloisio Gates

Answers

Answer:

The correct option is;

D'Aloisio

Explanation:

Summly, the summarization application, founded by Nick D'Aloisio, summarizes news articles into shorter form of small number of sentences, using language processing and rocket science from Stanford Research Institute (SRI) scientists to isolate important items in news articles. D'Aloisio was also the youngest ever person to have been given VC funding to aid in the Summly development.

Answer:

the correct answer is D. D'Aloisio Gates

Explanation:

Which tab do you select to execute Mail Merge option?​

Answers

Answer:

I don't know if you are not the intended recipient, you can get it right away and we are a couple days, so I'm sure it was the only one that has

Explanation:

uueej, but it was the only one that is a great way. . . . . , and then you have a lot more to do. . the other side, but the most of us who we were all very

Your company must reduce its electronic waste by 10 percent in the next year. What can the company do to meet this goals? A. Become more active on social media. B. Use sleep modes and other power management features for computers and devices. C. Print copies of email messages. D. Discard old laptops and cell phones.

Answers

Answer:

B

Explanation:

In the question it's clearly mentioned that " reduce its electronic waste by 10% " it means to reduce electricity consumption and in the given options option B suits best.

Power management is a portable computer service that allows users to adjust the amount of electrical power used by an underlying device while minimizing performance.

It permits the changing of gadgets in various ways, each with varying power demand aspects relating to system performance.Sleep mode is indeed an energy-saving mode that halts most computer activities. Any open documents and applications are relocated to system memory (RAM), and the machine also enters a low-power mode.In the coming year, your company should minimize its waste production by 10%. To achieve these goals, the business uses sleep modes as well as other power management capabilities on computers and devices.

Therefore, the final answer is "Option B".

Learn more about the opportunity cost:

brainly.com/question/11379685

Which HTML tag is formatted correctly?
NEED ANSWER ASAP PLZ HELP ME IDONT UNDERETAND IT​

Answers

I think the last one is the correct one

Answer:

D

Explanation:

All others don't work

The following code should take a number as input, multiply it by 8, and print the result. In line 2 of the code below, the * symbol represents multiplication. Fix the errors so that the code works correctly: input ("Enter a number: ") print (num * 8) The code above is pre-populated in your code editor. Hint: Remember that to think about the data type that the user will input. How can you make sure that their input is entered as a number?

Answers

Let's check sample input and output

[tex]\tt num=int(input("Enter\:a\:number:"))[/tex]

[tex]\tt print(num*8)[/tex]

Sample run

[tex]\tt Enter\:a\: number:6[/tex]

[tex]\tt 48[/tex]

write a progrma in java to input a letter. If it is an upper case letter then encode it by next 5th letter,otherwise encode it with 3rd previous letter in the ASCII code​

Answers

BK Kaunas sa job I am b2k

what is the full form of DBMS​

Answers

Answer:

Database Management System.

Answer:

"Database Management System."

Explanation:

In short, a DBMS is a database program. Technically speaking, it is a software system that uses a standard method of cataloging, retrieving, and running queries on data.

Jemima has finished formatting her main headings. She now wants to format her two subheadings. She wants to apply the format of her first subheading, not the format of the main heading, to the second subheading. Which feature of Word would help her to complete this task efficiently?

Answers

Answer:

the Format Painter feature

Answer:

the format painter feature

Explanation:

The Event Viewer(Microsoft windows) or console(apple Mac OS x) is used for what purpose?​

Answers

Answer:

it is used to view incidents recorded in the Application, Security, and System logs

Explanation: pls make my answer brainliest

Answer:

C) it is used to view incidents recorded in the Application, Security, and System logs

Maia wants to highlight the word mob in her first paragraph. Choose the steps that Maia will need to do to complete this process.

Answers

Answer: Step 2: Go to the font command group

Step 3: click on the text highlight color button

Step 4: Click on the color

Explanation:

Mala should do this by selecting her paragraphs and choosing Line and Gap from the Paragraph command group.

What are paragraphs?

A paragraph is a standalone section of writing that discusses a single subject or argument. One or more sentences make up a paragraph. Although they are not needed by any language's syntax, paragraphs are typically taken for granted in professional writing and are employed to break up the lengthier text.

The space between her paragraphs can be rapidly and simply adjusted by Maia. She should select her paragraphs and choose Line and Spacing from the Paragraph command group to accomplish this. From the drop-down menu, she should be able to select Add Space Before Paragraph.

The paragraph spacing has to be adjusted. She can choose the Line Spacing option from the same drop-down menu. The dialog box for paragraphs will then open. She will be able to choose the amount of space she wants before and after the paragraph using this option. These two choices are situated and displayed underneath the dialog box for paragraphs.

Therefore, she should select her paragraphs and choose Line and Spacing from the Paragraph command group to accomplish this.

To know more about paragraphs follow

https://brainly.com/question/11600913

#SPJ2

On Monday, you log into your computer at work, but you are not able to access any network resources. You run ipconfig and see that your address is 169.254.18.53. What is the most likely cause of the problem

Answers

Answer:

Ip address which starts with 169.254 are special kind of addresses. when computer asks for a IP address and nothing responds to it gives itself something called APIPA( Automatic Private Ip Addressing). this IP is having very limited connectivity. since your machine made up your own address nobody would know where to send data and etc.

Explanation:

simply your machine cannot reach DHCP (dynamic host configuration protocol) server over the network

Other Questions
find the rule as an equation. for example, y= x+m A crystalline form of solid fat is ?_ _ _ _ _ _ _ _ _ _( 10 letter word ) Select all the expressions that are equivalent to5x + 8y + 2.(Select all that apply.)3x + y + 2x + 2 + 7y8x + 4y 3x + 4 3y2 +12y + x 4y + 5x5y + 7 + x 5 + 4x + 3y i really need help please answer this The points (-11, r) and (-6, 12) lie on a line with slope 2. Find the missing coordinater r. Which passage from the text best supports the answer to question 7 Otto spent Three-fourths of the money he had saved on a new video game. If the video game cost $48, how much money did he have before he bought the game? 5. Robyn enjoys news _______ about health because she's a doctor. She also reads articles about health. Find the density of a substance that has a mass of 75g and a volume of 35 mL Easy math please help I dont wanna fail Tell which set or sets the number below belongs to: natural numbers, whole numbers, integers, rational numbers, irrational numbers, or real numbers. 0 Identify 4 benefits of good healthcare system Which had the biggest impact on economic growth in Sumerian city-states? A)writing literature B)building ziggurats C)trading between city-states D)protecting the city-state from invaders Duke and pat collins have adjusted gross income of $358,000. they have itemized deductions of $20,000 consisting of $8,000 in medical expenses that exceed 10% of adjusted gross income, $3,000 in property taxes, $4,000 in housing interest, and $5,000 in miscellaneous itemized deductions that exceed 2 percent of adjusted gross income. what is the amount of their itemized deduction? PLEASE HELP! Tillman the Bulldog held the Guinness World Record for the Fastest Dog on aSkateboard. Tillman skated 100 meters in 19.678 seconds. After watching thevideo, a student said, "Wow, that's amazing! The dog went about 5 meters persecond!" Was the student correct? How do you know? Nina and Jon are practicing an ice skating routine. Nina is standing still. Jon, who is twice as heavy as Nina, skates toward her, pushing Nina away with force f. Assuming the system is closed, which statement is correct about this system? a. Nina experiences a force equal to f/2. b. Nina experiences a force equal to f^2. c. Nina experiences a force equal to 2f. d. Nina experiences a force equal to f. 1. An insect inside a bus flies from the back toward the front at 2 m/s. The bus is moving in astraight line at 20 m/s. What is the total speed of the insect as seen by a person standingside of the road? What would be the cost to society of abandoning affirmative action? (1 paragraph response) Which of the following statements about a steady state is false?- During a steady state there is no net change in the membrane potential.- The resting potential is an example of a steady state.- During a steady state each ion's driving force is O mv.- A system at equilibrium is also considered to be at a steady state. Describe how catching exceptions can help with file errors. Write three Python examples that actually generate file errors on your computer and catch the errors with try: except: blocks. Include the code and output for each example in your post. Describe how you might deal with each error if you were writing a large production program. These descriptions should be general ideas in English, not actual Python code.