1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
3 years ago
9

What will be the output after the following code is executed?

Computers and Technology
1 answer:
Gnesinka [82]3 years ago
4 0

Answer:

D) Gaddis, Tony

Explanation:

- When you look at the function <em>pass_it</em>, it takes two arguments and returns these arguments with a comma between them.

- <em>name1</em> and <em>name2</em> variables are assigned as Gaddis and Tony.

<em>fullname</em> variable calls the the <em>pass_it</em> and gives above variables as arguments.

<em>fullname </em>variable (which is now equal to Gaddis, Tony) is printed.

You might be interested in
What is one way to overcome sad feelings?
laiz [17]

Answer:

music

Explanation:

it calms u and takes away all ur worries for that time because ur just vibing

4 0
2 years ago
Read 2 more answers
Using MARS/MIPS
slega [8]

Answer:

Explanation:

MIPS program which increments from 0 to 15 and display results in Decimal on the console

In this program the user defined procedures print_int and print_eot were used to print the integer values and new line characters(\n) respectively.the mechanisam of the loop is explaine in the comment section of the program.

     addi $s0, $0, 0

     addi $s1, $0, 15

print_int:

              li $v0, 1                # system call to print integer

              syscall                

              jr $ra                     # return

print_eol:                      # prints "\n"

            li $v0, 4            

              la $a0, linebrk      

              syscall              

              jr $ra                  # return

main: . . .          

              li $a0, 0                # print 0

              jal print_int         # print value in $a0

loop:   move $a0, $s0           # print loop count

       jal print_int        

       jal print_eol           # print "\n" character

       addi $s0, $s0, 1        # increment loop count by 1

       ble $s1, $s0, loop      # exit if $s1<$s0

beq $s0, $0, end

end:

MIPS progam to increment from 0 to 15 and display results in Hexadecimal on the console

this program is slightly differed from the previous program in this program the system call issued in print_int is implemented with a system call that prints numbers in hex.

addi $s0, $0, 15

     addi $s1, $0, 0

print_int:

   li      $v0,34                  # syscall number for "print hex"

   syscall                         # issue the syscall

              jr $ra                     # return

print_eol:                      # prints "\n"

            li $v0, 4            

              la $a0, linebrk      

              syscall              

              jr $ra                  # return

main: . . .          

              li $a0, 0                # print 0

              jal print_int         # print value in $a0

loop:   move $a0, $s0           # print loop count

       jal print_int        

       jal print_eol           # print "\n" character

       addi $s0, $s0, 1        # increment loop count by 1

       ble $s1, $s0, loop      # exit if $s0>$s1

beq $s0, $0, end

end:

5 0
3 years ago
IPv4 addresses are managed and controlled by Internet Service Providers (ISPs) which operate on a local basis. As such, Internet
klio [65]

Answer:

The following statement is True.

Explanation:

Because the Internet Service Provider is the company that grants users to access the internet and It also controlled and manage the IPv4 addresses which are operated on a regional or a local basis. The map of all the incoming and outgoing Internet Protocol addresses between the ISPs is done by the IXPs(Internet Exchange Points).

7 0
3 years ago
Which of the following is not a SQL*Loader file?
MatroZZZ [7]

Answer:

D. Good file

Explanation:

SQL loader is responsible for loading data from files into the database. It needs the mandatory control file, bad file, log file and an optional discard file.

A. Bad file

This file shares its name with the data file and has .bad extension.

The bad file holds all the records which are rejected ( bad data ). If a bad file is not available, it is automatically created. The data is either rejected by the SQL loader or by Oracle itself. The rejected records are not placed in the data file and hence, have to be placed in the bad file.

It is mandatory to have a bad file for every data file.

B. Control file

This is a mandatory file. This is a text file needed by the SQL loader to perform the loading process.

It contains the information related to location of data, specifies the criteria for selecting data for insertion, location for inserting data, and the like.

C. Discard file

The discard file is created if the need arises. This is not a mandatory file to be present.

The data which is discarded and gets filtered out, is placed in the discard file.

The data is not inserted in the table because it does not matches the criteria for the data to be inserted.

This criteria is mentioned in the control file.

The data is discarded only due to the mismatch and not because it is rejected or is bad data.

E. Log file

This file is mandatory to the execution. In absence of log file, the loader does not proceeds with execution and gets terminated.

In the beginning of the execution, a log file must be created by the loader. This file contains all the information regarding the data loading and also the errors encountered during the loading process.

6 0
2 years ago
8. Understanding the proper classification of a problem or fault
kati45 [8]

Answer:

a

Explanation:

because the trust need to know what was the problem in the first place

8 0
3 years ago
Other questions:
  • What leadership style involves the ideas of advice others
    6·1 answer
  • Litmus-type test strips are used to test coolant for freeze protection and ?
    12·1 answer
  • A coworker is concerned about the veracity of a claim because the sender of an email denies sending it. The coworker wants a way
    6·1 answer
  • Which of the following button should always be included when designing a navigation pictures escape contact FAQ
    5·2 answers
  • Among the eight unique features of​ e-commerce, which is related to the ability to interact with web technology​ everywhere?
    14·1 answer
  • Explain block diagram of. computer architure​
    5·1 answer
  • What is the different between the patch Tool and the Headling Brush tool?​
    5·1 answer
  • Please someone do this for me and send a screenshot i really need it for my exams pleaseeee :(<br>​
    10·1 answer
  • A system is being developed to help pet owners locate lost pets. Which of the following best describes a system that uses crowds
    12·1 answer
  • Give a brief explanation about the internet.plsssss
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!