4.2.5 - Analyse an algorithm presented as pseudocode