1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
2 years ago
7

What is output by the following code?

Computers and Technology
1 answer:
Naily [24]2 years ago
4 0

Answer:

Sum = 3

Sum = 9

Sum = 18

Sum = 30

Look at the image for more information.

You might be interested in
Which function key will help you find the word and replace
MaRussiya [10]

F5 key on your keyboard in word and power point if that is what you are referring to.


3 0
3 years ago
____________ describes all the communication channels that allow community-based input, interaction, content-sharing and collabo
vladimir1956 [14]

Answer:

Social media.

Explanation:

The social media is an online platform that provides its users with the web application interface for easy communication. Since it is online, the user must subscribe to a ISP service, create an account on the social media website, and optionally download it's application on the device for easy access.

User accounts are secured with a username and password. The user on the site can share graphic, video, audio and text content, interact with friends etc.

7 0
3 years ago
Refer to the method f:
Goshia [24]
<h2>This function will land up in infinite function call</h2>

Explanation:

first time when the function gets invoked,

f(6,8), so k=6 & n=8, inside the function it checks k==n, ie. 6==8, returns false, then one more if is available, so 6>8 is check for , once again it is false and else loop is executed, the function is called recursively using f(k-n,n), that is f(6-8,8), it means f(-2,8) is passed.

Second time,

if(-2==8) is false, so if(-2>8) is again false and function f(-10, 8) is called

if(-10==8) is false, so if(-10>8) is again false and function f(-18,8) is called

if(-18==8) is false, so if(-18>8) is again false and function f(-26,8) is called

So this goes recursively and ends in an infinite function call.

5 0
4 years ago
Q1. Which implementation of Network Access Control checks users' credentials to determine what level of access they should have
sesenic [268]

Answer:

3. RBAC

Explanation:

6 0
3 years ago
Why is it difficult to convince top management to commit funds to develop and implement a Strategic Information System
jek_recluse [69]

Answer:

It is difficult to <u>convince top management </u>to commit funds to develop and implement an SIS because it can lead to reengineering, which requires businesses to revamp processes to undergo organizational change to gain an advantage.

Explanation:

7 0
3 years ago
Other questions:
  • Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization’s network. When
    5·1 answer
  • What is the best overall approach to education and career development for IT professionals?
    14·2 answers
  • In two to three sentences, describe how you would move a file.
    6·1 answer
  • What type of data is not defined and does not follow a specified format and is typically free-form text such as emails, Twitter
    13·1 answer
  • Visual basis,C, C++ and Java are all examples of computer programming ________.
    15·1 answer
  • Part 1: 1) Write a C program getPhoneNumber.c that accepts a phone number from the user in the form XXX-XXX-XXXX, and then displ
    12·1 answer
  • Why there isn't in italian this app?​
    15·1 answer
  • The declaration of variables begins with a command a. dim b. rem c. const​
    8·1 answer
  • A life insurance salesperson who takes advantage of the foot-in-the-door phenomenon would be most likely to:________
    14·1 answer
  • Is a mainframe computer portable?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!