Answer:
8
Explanation:
Gear reduction = driven gear teeth / driving gear teeth
First stage reduction :
Driven gear teeth = 36
Driving gear teeth = 12
36 /12 = 3
Second stage reduction :
Driven gear teeth = 60
Driving gear teeth = 12
60 /12 = 5
First stage + second stage
3 + 5 = 8
Answer:
for (int h = k; h >= 0; h--)
Explanation:
From the list of given options, option C answers the question.
In the outer loop
Initially, k = 0
In the inner loop,
h = k = 0
The value of h will be printed once because h>=0 means 0>=0 and this implies once
To the outer loop
k = 1
The inner loop will always assume value of k;
So,
h = 1
This will be printed twice because of the condition h>=0 means 1>=0.
Since 1 and 0 are >=0; 1 will be printed twice
To the outer loop
k = 2
The inner loop
h = 2
This will be printed thrice because of the condition h>=0 means 2>=0.
Since 2, 1 and 0 are >=0; 2 will be printed thrice
To the outer loop
k = 3
The inner loop
h = 3
This will be printed four times because of the condition h>=0 means 3>=0.
Since 3, 2, 1 and 0 are >=0; 3 will be printed four times
The <span>magnitude of the largest positive value you can place in a bool, a char, an int, a float, a double are as follows:
</span><span>Int: 4 bytes Float: 4 double: 8 char: 1 boolean: 1
</span>
I hope my answer has come to your help. God bless and have a nice day ahead!
Answer:
The code to this question can be given as:
Code:
while ((s!="Y" && s!="y" && s!="N" && s!="n")) //loop for check condition
{
cin >> s; //insert value
}
Explanation:
The description of the following code:
- In this code, we use a string variable s that has been to define in question.
- In code, we use a while loop. It is an entry control loop in loop we check variable s value is not equal to "y", "Y", "n" and "N".
- In the loop we use AND operator that checks all value together. If this is true So, we insert value-form user input in string variable that is "s".
Answer:
The oldest malware vector was emails.
Explanation:
Websites were not widespread early on into the internet, however it was very easy to have a virus that uses an email contact list, where it can send itself to other email addresses and spread.