Which word describes an important characteristic of good computer
algorithms?
A. Lengthy
B. Complex
C. Literal
D. Numerical

Answers

Answer 1

Answer:

D. Numerical

Explanation:

Computers software are made up of numbers and calculations making this the most likely answer for you're question.

Answer 2

Numerical word describes an important characteristic of good computer algorithms.

What is Numerical algorithm?

Designing shapes (such as those for cars, planes, and fonts) and computing requirements for displaying graphics, animating moving objects, studying the spread of diseases.

It  simulating the orbits of planets and satellites, supporting search engines like  and many other applications of mathematics are all made possible by numerical algorithms.

We will examine a variety of these issues in this course and discover how to create precise and effective numerical algorithms to address them.

Therefore, Numerical word describes an important characteristic of good computer algorithms.

To learn more about Algothirm, refer to the link:

https://brainly.com/question/22984934

#SPJ7


Related Questions

In the context of penetration testing, what is the gray box model?

Answers

In the context of penetration testing, the gray box model refers to a type of testing that involves a combination of both black box and white box testing techniques. This means that the testers have partial knowledge about the security controls and infrastructure of the system being tested, but not complete access.


The gray box model refers to a security assessment approach where the tester has limited knowledge of the target system. This method combines aspects of both black box (no prior knowledge) and white box (full knowledge) testing, allowing the penetration tester to evaluate the system's security with a more realistic perspective, while still leveraging some insider information to identify potential vulnerabilities more effectively.

The objective of gray box testing is to identify vulnerabilities that are not immediately obvious, while also verifying the effectiveness of the security measures that are in place. By conducting a thorough assessment of the system's security posture, the testers can help organizations to identify and address potential weaknesses before they can be exploited by attackers. Overall, the gray box model is an important tool for enhancing the overall security of a system and improving its resilience against potential threats.

Learn more about penetration testing here

https://brainly.com/question/13068620

#SPJ11

Need help with my hw.​

Need help with my hw.

Answers

If I am correct, it should be D. Hopefully I was helpful.
It is d I got it today

Which of the following is not a type of application software?
A)Microsoft Office
B)Encyclopedias
C)Games
D)Windows 98

Answers

Answer:

windows 98

Explanation:

Answer:

I think the best answer would indeed be B.

Explanation:

B. Encyclopedias

Write down the difference between Sub... end sub and function... end function statement.
any 3 points, please ​

Answers

A sub does something but doesn't give something back. A function provides a value representing the tasks completed. Subs come in many different types and can be recalled from anywhere in the program.

What is sub and end sub in VBA?

A Sub procedure is a collection of Visual Basic statements that are delimited by the Sub and End Sub statements and that carry out tasks without producing a result. A calling procedure may give constants, variables, or expressions as inputs to a sub process.

Various processes are used in Visual Basic, including: Sub Procedures carry out tasks but do not provide the calling code with a value in return. Sub procedures known as "event-handling procedures" run in response to an event triggered by a user action or by a program occurrence.

Thus, A sub does something but doesn't give something back.

For more information about sub and end sub in VBA, click here:

https://brainly.com/question/26960891

#SPJ1

You have N boxes in your room which you want to carry to a different place. There are too many to carry in one trip, so you want to split them into several piles using the following algorithm: if the current pile has at most M boxes, you can carry it as is, otherwise you split it into P parts as equally as possible (i. E. So that the sizes of the parts differ at most by 1) and apply the same algorithm to each of the parts. If you're trying to split less than P boxes into P piles, discard resulting zero-sized piles (see example 2).


Required:

Calculate the number of piles you'll get in the end

Answers


Start with the total number of boxes, N, that you have in your room. Check if the current pile has at most M boxes. If it does, you can carry it as is.  If the current pile has more than M boxes, you need to split it into P parts as equally as possible. To split the pile, divide the total number of boxes in the pile by P. The resulting quotient will give you the number of boxes in each part.

Check if there are any remaining boxes after the division. If there are, distribute them among the parts in a way that the sizes of the parts differ at most by 1. This means some parts may have one extra box compared to others.  Repeat the algorithm for each part. If a part has less than P boxes, discard the resulting zero-sized piles. Keep repeating the algorithm until all the piles have at most M boxes. Let's consider an example to better understand this algorithm: Initially, you have one pile with 20 boxes. Since it exceeds M (5), you need to split it into P (3) parts. Dividing 20 by 3 gives you 6 boxes per part (with 2 remaining boxes).


Distribute the remaining 2 boxes among the parts, ensuring that the sizes differ by at most 1. This could result in one part having 7 boxes and the other two having 6 boxes each. Now you have three piles: one with 7 boxes and two with 6 boxes each. Repeat the algorithm for each pile. Since the pile with 7 boxes exceeds M (5), you split it into three parts, resulting in three piles of 3, 2, and 2 boxes. The two piles with 6 boxes each do not need to be split further, as they already satisfy the condition of at most M (5) boxes.

To know more about  M boxes visit;  

https://brainly.com/question/29848981

#SPJ11

A _____ is a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam.

Answers

A large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam is called; botnet

To answer this question, we need to first define an internet bot. An Internet bot is simply defined as a software application that runs tasks in an automated manner over the Internet.

Now, a number of connected internet devices that run one or more bots is referred to as a botnet and this botnet tends to control tasks on the infected computers without the user's knowledge.

Read more on botnets at; https://brainly.com/question/13624552

g i r l s o n l y j o i n
id= ons jcuv jke

Answers

at least 20 characters long

In two to three sentences, describe some techniques you could use to save time when working with a spreadsheet.

Answers

Answer: Everything is neatly organized on a spreadsheet so that you can access information faster. You can use features like shortcuts and auto-fill for you to save time.

Explanation:

TIME REMAINING
50:56
2
3
4
5
6
10
In three to five sentences, describe whether or not files should be deleted from your computer. Explain your answer.
B
I
u
а
O Word(s)

TIME REMAINING50:562345610In three to five sentences, describe whether or not files should be deleted

Answers

Answer: Yes

Explanation:

I believe that files should be deleted once it no more of use because it’s a waste of space. Our devices can only hold so much so if we keep pilling up files on files we will then run out of space. But if we delete what not necessary we can have space to add more useful files.

List out analog computer​

Answers

Answer:

1. Wall clocks.

2. Analog watches

3. Measuring instruments with callibration

Explanation:

Why is data such a powerful form of evidence?

Answers

It proves the claim right being factual

Free 35 points!!!

I'm attempting to create a game on Khan Academy using the computer coding courses, but I can't find how to program a moving background or enemies, can someone please give me pointers/suggestions?

P.S. I'm trying to make a Galaga-like game (2-Dimensional) , and it has to be in JavaScript Processing code.

Answers

Answer:

free points?? why does it have question then

Explanation:

Answer:

Well I dont use Khan Academy sorry

Explanation:

c write the code that creates an object of type rectangle named box1 using a no argument constructor.

Answers

Answer:

JAVA

Rectangle box1 = new Rectangle();

Give at lesat 3 examples of how is NLG (Natural Language Generation) beneficial and unbeneficial (pls support your points)

Answers

NLG (Natural Language Generation) is beneficial isuch as automating content creation, personalizing user experiences, and generating insights from data but have limitations including potential biases in generated content and difficulties in capturing nuanced human language.

How is NLG beneficial and unbeneficial?

NLG offers numerous benefits including the ability to automate the generation of content across different domains, such as news articles, product descriptions, and weather reports. This helps save time and resources by eliminating the need for manual content creation.

NLG systems may have limitations. One concern is the potential for biased content generation as the models are trained on existing data that may contain biases. This can lead to the generation of discriminatory or misleading content.

Read more about Natural Language

brainly.com/question/14222695

#SPJ1

NLG is beneficial in generating content quickly and accurately, maintaining consistency, and providing a personalized user experience

NLG, or Natural Language Generation, is the method of generating natural language text using computer algorithms. It is a subfield of artificial intelligence that focuses on creating human-like texts, thereby making it easier for humans to interact with machines. Natural Language Generation is beneficial in many ways, but it also has its limitations. In this response, we will discuss the benefits and drawbacks of NLG in detail. Benefits of Natural Language Generation (NLG):

1. Efficient content creation: NLG algorithms can generate content faster than human writers, making it easier for businesses and publishers to create large amounts of content in less time. This is particularly beneficial for news and sports articles, where quick updates are required.

2. Consistent quality and tone: NLG can ensure that the content is written in a consistent tone and style, maintaining the brand's voice and values. In contrast, human writers can experience mood changes, which may influence the quality of their writing.

3. Personalization: NLG algorithms can create personalized messages and content, providing a better user experience for customers and clients. It can also be used for chatbots to provide human-like interactions with customers, improving customer satisfaction.

Unbeneficial of Natural Language Generation (NLG):1. Limited creativity: NLG algorithms can generate text based on the data it is fed. However, it lacks creativity and may fail to produce the same level of creativity as human writers. NLG cannot replace human writers' creativity, which is required in fields such as literature and poetry.

2. Dependence on data quality: NLG requires high-quality data to generate effective texts. Low-quality data may result in incorrect information and errors in the generated text.

3. Lack of empathy: NLG algorithms lack human empathy and understanding of social and emotional contexts. This may cause problems in situations that require a high level of emotional intelligence, such as counseling, medical diagnosis, and human resources. Therefore, NLG is beneficial in generating content quickly and accurately, maintaining consistency, and providing a personalized user experience. However, it has its limitations and cannot replace human creativity, empathy, and emotional intelligence.

For more questions on articles

https://brainly.com/question/25276233

#SPJ8

Un usuario desea conocer de manera descriptiva ,como se lleva a cabo el proceso de solicitud de transferencia monetaria en una población local, pues desconoce cómo se proporcionan esas respuestas y le interesa saber cómo es que se lleva a cabo dicha transmisión desde donde él se encuentra ubicado, que es el punto A, hasta donde lo recibe la otra persona que es el punto F. Proporciona la solución a la problemática.

Answers

Answer:

Research My Friend Use a Translator Promise!!

Answer:

what

Explanation:

Imagine you have downloaded to your computer a very large informational Word document about the differences of the habitats of various types of moths. Your job is to create a short report describing the difference between the habitat of an Apatelodid Moth and the Slug Caterpillar Moth. How will you use the Find feature to help you with your paper? What key words might you use for your search?

Answers

Answer:

Using the find feature I would type the words 'Apatelodid Moth' and 'Slug Caterpillar Moth' so it will find relevant details about both types of the moths which will then allow me to compare and contrast them to find there differences.

What are the advantages and disadvantages of using a CSS framework

Answers

CSS issues can cause ambiguity due to the numerous CSS levels. Novices are highly susceptible to this issue, but the benefits of using it include better control over the layout of a web page. Reduced file size means less bandwidth, which means faster loading time, and so on.

What is CSS?

Cascading Style Sheets is a sheet language applied for trying to describe that is used to describe the appearance of a document written in a markup language like HTML or XML.

CSS, like HTML and JavaScript, is a foundational technology of the World Wide Web.

Due to the obvious numerous CSS levels, CSS problems can lead to ambiguity. Although novices are more vulnerable to this issue, the benefits of using it include complete leverage over the configuration of a web page.

Less bandwidth means less file size, which means faster loading time, and so on.

Thus, these are some pros and cons of using CSS.

For more details regarding CSS, visit:

https://brainly.com/question/27873531

#SPJ1

Why should a user preview the document before printing?​

Answers

The user should preview a document first to make sure the layout is correct, so as not to waste paper if a font size or layout is incorrect.

Answer:

..........

Explanation:

.................sorry i dont know

Jimmie Flowers, known as Agent 13, is back! However, he has a secret that until now nobody has noticed (although we aren't sure how we missed it!) Jimmie can't stand to have objects that are not properly aligned. If any object is slanted (not aligned), he feels obligated to adjust that object to properly align them. Jimmie needs your help, though! He wants you to take bricks (which we will represent by just one of their edges) and determine if they are aligned or not. The Problem: Given two unique points on a line, create a function that will accept these points and determine if the line is a horizontal or vertical line. How to check if there is vertical or horizontal line Given with two object points: P, (x,y), and P2 (ty). To determine if there are any vertical or horizontal lines, we check if either (x,xorly, y). Note: You need to implement pass by reference in solving this problem to demonstrate the use of pointers. Input Format: The input will begin with a single, positive integer, R, on a single line, representing the number of objects followed by the object unique points separated by line. For each object, there will be four non-negative integers, xl, yl. 22 and y2 (all S 100), on a single line cach separated by a single space where xl, yl) represents one point on the edge and (x2, y2) represents a second and different) point on the same edge. Example Input Output Format For each object, if it is slanted (not horizontal or vertical), output "We need to fix this" or output "It's all good" if it is not. Each output should be on a separate line. Example Output We need to fix this It's all good Example Program Execution: Example 1132 1131 we need to fix this It's all good Example 2 13510 5541 1121 It's all good It's all food He need to fix this Me need to fix this It's all good Note: Use the input from the screen shot above to test your program.

Answers

The given problem is a code implementation question. The given problem asks us to create a function that will accept two unique points on a line and determine if the line is a horizontal or vertical line. The given problem provides the format of input, output, and constraints that need to be followed while writing the code.

The function for the given problem can be written in C++ as follows:```#includeusing namespace std;void checkLine(int& x1,int& y1,int& x2,int& y2){ if(x1==x2) cout<<"It's all good\n"; else if(y1==y2) cout<<"It's all good\n"; else cout<<"We need to fix this\n";}int main(){ int n; cin>>n; while(n--){ int x1,y1,x2,y2; cin>>x1>>y1>>x2>>y2; checkLine(x1,y1,x2,y2); } return 0;}```In the above code, we have a function check-in that accepts four integer values x1,y1,x2,y2 which are the unique points on a line. The function uses pass by reference to modify the values of x1,y1,x2,y2 within the function.

The function checks if the line is horizontal by comparing the values of y1 and y2, if they are equal, then the line is horizontal. Similarly, the function checks if the line is vertical by comparing the values of x1 and x2, if they are equal, then the line is vertical.If the line is neither horizontal nor vertical, then the function prints "We need to fix this".In the main function, we take the input in the given format and call the checkLine function with the given points. The output is printed based on the value returned by the checkLine function.

To know more about horizontal  visit:-

https://brainly.com/question/29019854

#SPJ11

true or false? it is impossible to use malloc( ) to create an array that you are sure starts on a cache line boundary.

Answers

True, it is impossible to use malloc() to create an array that you are sure starts on a cache line boundary. The malloc() function allocates memory from the heap, which is a dynamic memory pool managed by the operating system. The starting address of the memory block returned by malloc() is not guaranteed to be aligned on a cache line boundary, and it may not even be aligned on a word or double-word boundary.

To allocate memory that is guaranteed to start on a cache line boundary, one can use compiler-specific or architecture-specific features, such as posix_memalign() or aligned_alloc() on POSIX-compliant systems, or _aligned_malloc() on Windows systems. These functions allow developers to specify the alignment of the memory block to be allocated, ensuring that it starts on a cache line boundary.

To learn more about   click on the link below:

brainly.com/question/13537296

#SPJ11

Type the correct answer in each box. Spell all words correctly.
Which keys should you press to insert a comment?
You should press the + + keys to insert a comment.

Answers

Ctrl +Alt +N keys   keys should you press to insert a comment.

What is insert a comment?

Add a comment

Click at the end of the text or choose the text you wish to remark on.

Click New Comment under the Review tab.

Write a comment. Your comment is shown by Word as a bubble in the document's margin.

A comment is similar to a note written in the page margin of a document. To add recommendations, notes, or reminders to your papers, use Word's comments tool. Boxes on the side of the page contain comments.

Choose the text to which you wish to add a comment.

On the Review tab, click.

In the Comments group, select the New Comment option.

Using the document's right-click menu, choose New Comment.

Read more about insert a comment:

https://brainly.com/question/11521454

#SPJ1

In a classification setting, if we do not limit the size of the decision tree it will only stop when all the leaves are:a- All leaves are at the same depth b- of the same size c- homogenous d- heterogenous

Answers

If the decision tree's size is unrestricted, it can expand indefinitely until it perfectly categorises all of the training data, producing a tree with each occurrence in its own leaf.

Using recursive partitioning of the input data into subsets based on the values of input features, the decision tree is a popular machine learning technique that makes decisions. The choice represented by each node in the tree is based on a particular feature, and the decision's result is represented by each edge. A hierarchy of if-then-else decisions is built using the tree's training set of labelled data to predict the class label of incoming, untainted data. Decision trees are well renowned for their simplicity, interpretability, and capacity to handle complex data and are frequently used for classification and regression applications. Unpruned trees, however, might result in overfitting and subpar generalisation abilities.

Learn more about decision tree's  here:

https://brainly.com/question/30610880

#SPJ4

What do macOS and Windows use to prevent us from accidentally deleting files?

Answers

macOS and Windows use a Trash can—or Recycle Bin—to prevent you from accidentally deleting files. When you delete a file, it is moved to the Trash can.

tractor in reverse brainliest answer

Answers

Answer:

Valtra

Explanation:

It is the only tractor that goes in reverse.

Thank you so much!

Have a good day

Hope this helped,

Kavitha Banarjee

test unit 8 edhesive answers ​

Answers

What are the questions

nadia has been asked to perform dynamic resource allocation on specific cloud computing resources. what action is nadia taking

Answers

The action that Nadia should take to perform dynamic resource allocation on specific cloud computing resources is known as deprovisioning resources.

Cloud computing states the delivery of different services by the Internet, consist data storage, servers, databases, networking, and software. Deprovisioning means the behavior of erase user access to applications, systems and data within a network. The opposite of deprovisioning is called provisioning, which grants, deploys and activates services for users in a system. Deprovisioning means the part of the company life cycle that is used to access rights to software and network services are taken away. Provisioning is not equal to configuration, but they are both methods in the deployment process.

Learn more about Cloud computing at https://brainly.com/question/11973901

#SPJ4

why is plastic durable?

Answers

Plastic is not always really durable, but the chemicals and what makes plastic helps with the durability. As a pliable polymer, plastics are made from long chains of synthetic or semi-synthetic molecules. All its carbon-to-carbon bonds hold these molecules together. The bonds is what makes plastics so durable.

Plastic is very stretchy and can take a but for it to actually rip and expose whatever it is protecting

a request for the database to provide the information needed to deal with a problem or to answer a question. the information is retrieved, displayed, and/or analyzed as requested. this is called a

Answers

If a request for the database to provide the information needed to deal with a problem or to answer a question and the information is retrieved, displayed, and/or analyzed as requested, this is called a:

Query.

A query is a request for information from a database. The user specifies what data they need and the database system searches for and retrieves the relevant information. The information is then displayed or analyzed according to the user's specifications.

Queries can be simple requests for a single piece of information or complex requests that involve sorting, filtering, and aggregating large amounts of data. Queries are a crucial aspect of database management, as they allow users to easily access the information stored in the database and make informed decisions based on the data.

Learn more about Query:

brainly.com/question/16349023

#SPJ4

what is the plan to make optimum usage of available spaces?

Answers

Answer:

dergragmentation or share to speed up procceces

if a computer with an internal battery stops responding or cannot be powered off by pressing the power button, which of the following might help?

Answers

The method which will help is to unplug the power cord.

We are given that;

The situation about the computer

Now,

If a computer with an internal battery stops responding or cannot be powered off by pressing the power button, there are several things you can try to fix the issue.

One of the things you can do is to unplug the power cord from the surge protector or battery back-up unit and plug it directly into a wall outlet. Then turn on the computer to see if the problem persists. If the computer stays powered on, the surge protector or battery back-up unit is bad and needs to be replaced.

Another thing you can try is to press and hold the power button of your system for 5 to 10 seconds until the PC is shut down completely. Then remove your complete system from power for 5 to 10 minutes. Unplug the power cord, and if you are working on a laptop, remove the battery too.

Therefore, by computer answer will be unplug the power cord.

To learn more about computer visit;

https://brainly.com/question/28464006

#SPJ4

Other Questions
aristotles term for logic is... A. credos B. ethosC. pathosD. logos x^3x^5=x^p, where p= what is the problem statement for corn mold test mycotoxins? a continual shifting from topic to topic without any apparent logical or meaningful connection between thoughts is referred to as: 4. Early people used fire to cook food. (1 Point) True False Judy jarred 45 liters of jam after 9 days. How much jam did Judy jar if she spent 10 days making jam? Assume the relationship is directly proportional. Solve for x2x+5 = 32 0 11) Find vet (24318 U ) T>O 2+ /) a) 3 In(2 + 3x) + c b) o 3 ln(2 - 3VX) + c c) In(2 + 3VX) + c } ln(2 - 3/3) 3/8) + c do What does the tilt of Earth on its axis cause? Many proteins are regulated by the binding of GTP or GDP. Which form is the active state of the protein Which expression has the same value as -73 +3/? Consolidation is the process that transforms new memories from a fragile state in which they can be disrupted toa more permanent state in which they are less likely to be disrupted. That explains why _________ is common after a trauma Picture a desert habitat. It's hot, dry, and sandy. It's not a very colorful landscape, and it doesn't rain very often. Design your own "perfect organisms" - one plant and one animal Draw your organisms, label their adaptations, and write 2-3 sentences explaining why they're perfect for the desert environment. when describing the uncertainty of a measurement, the term choose... refers to the closeness between a measurement and its accepted value, whereas the term choose... refers to the closeness among a set of measurements. Who is the Greek philosopher quoted by Bacon in his of love? 3. What is a "Moderating Variable"? Please give an example to illustrate your answer. the nurse in the nicu is caring for preterm newborns. which guidelines are recommended for care of these newborns? select all that apply. 5. Determine the area of the square that would be attached to the hypotenuse of each right triangle. a) 17 cm 26 cm m ^ 2 + 15 ^ 2 = c ^ 2 7 cm 967.2 cm b) Amy works 15 hours a week at the movie theater. She earns $8 an hour. What statement is true about her weekly income? A) Her net income is more than $120. B) Her gross income is less than $120. C) Her net income is less than $120. D) Her gross income is more than $120. Prompt using complete sentences post a detailed response to the following. it is very helpful to have a second language in life and in career. develop a logical argument for why asl makes a useful second language for you. include supporting evidence and concrete details in your answer