1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
3 years ago
14

Assume the integer variable num has been assigned a valid value. What is the purpose of the following code segment?

Computers and Technology
1 answer:
Pie3 years ago
7 0

Answer:

2

Explanation:

The num%4 operation returns the remainder, so only if num is not a multiple of 4, this value will be non-zero (it will be 1, 2 or 3).

You might be interested in
Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit do
bekas [8.4K]

Answer:

Check button under error checking

Explanation:

Under the Tools tab there are two options:

Error checking and Optimize and defragment drive option.

clicking the check button with administrative permission under error checking option will examine the hard drive for errors.

3 0
3 years ago
When you block a number can they still text??
noname [10]
When a blocked number tries to send you a text message, it won’t go through, and they will likely never see the “delivered” note. On your end, you’ll see nothing at all. As far as phone calls are concerned, a blocked call goes directly to voice mail. On your end, you’ll get a special “blocked messages” folder in your voice mail inbox if they leave a message, but you won’t get a notification they called.
5 0
3 years ago
What best describes the kinds of online items that are usually protected by copyright law?
Sergeu [11.5K]

technically, anything that is copyright protected. but the answer that best describes the kinds of online items that are usually protected by copyright law?  the answer is D. Most media work that is available for money


Hope this helps!

-SchoolIsBlaaa

7 0
3 years ago
Question 12 There are ____ octets in an IP address.
Marta_Voda [28]
The standard IP convention used in today's network is IPv4. Taking for example one basic IP address we have 192.168.1.1 - The ff IP has 4 octets. An octet is a group of 8 bits on the sample, we have 4 Octets making up 32 a standard 32 bit address.
6 0
4 years ago
List and the deference between MS access objects​
Dafna11 [192]

Answer:

MS access objects help the user list , information and designed reports .

Explanation:

MS access objects are create a forms, data base, tables,queries, and modules. There are many objects are following:-Tables, Forms,Reports, Queries.

Table:- These are objects used into a define and store the data,tables are contain the columns and the store of different data.

Form:- Form is the object that designed by the data input and control application queries or tables, forms are used in viewing records.

Reports:- Reports are the designed to the printing and calculating data,reports are used because data in read to easy format.

Queries:- Queries are provides that data from one or more table,you can define the update ,delete, insert, select data.

4 0
4 years ago
Other questions:
  • What line of code will import matplotlib in it
    10·1 answer
  • What engine component is shown in the above Figure?
    14·2 answers
  • When photographing wildlife, what type of lighting should you use?
    15·2 answers
  • Match the categories in the first column with examples in the second column.
    14·1 answer
  • In Broadbent's filter model of attention, the stages of information processing occur in which order?
    9·1 answer
  • HELP PLS TIME LIMIT HERE
    11·1 answer
  • While organizing his computer's power cords, Matt realizes his printer power cord is frayed (coming apart). What should Matt do
    10·1 answer
  • Think about that the C, B and S parameters of a Cache. Think about what happens to compulsory, capacity, conflict misses, if onl
    7·1 answer
  • What level of system and network is required for cui
    7·1 answer
  • Question 1 Why should a user seek support when troubleshooting a computer problem is beyond his or her technical knowledge?​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!