1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sauron [17]
3 years ago
10

What are three situations when recursion is the only option available to address problems?

Computers and Technology
1 answer:
victus00 [196]3 years ago
8 0

Answer and Explanation:

Recursion is a technique to solve a problem where a function in a program calls itself at specified times.

The three situations when recursion is the single option available to solve a problem are:

  • When a task is required to repeat itself without the use of loop.
  • When we want to take a print of the result of the functions used in the program which calls itself in the order which is reversed. This makes use of stack.
  • Where the solutions are provided such that it follows the order in solving from the inner most to the outer extreme level of the tasks. As in case of recursion in deleting the files  and the directories, files are deleted followed by directories.

You might be interested in
HELP PLSS‼️ Which are the following are considered peripherals? Mark all that are correct
My name is Ann [436]

Answer:

Speaker, Keyboard, Monitor, Mouse

Explanation:

A peripheral device is used to put input into (or receive output from) a computer. Parts of a computer wouldn't be considered peripheral.

5 0
3 years ago
Your recovery/recycling machine has r-502 refrigerant in it. you now have to recover refrigerant from a unit with r-22. what mus
zimovet [89]
Recover as much of the R-502 from the recovery unit as possible, change filter, and evacuate. In addition, to alter the compressor on a system containing R-410A, the person must isolate the compressor then evacuate the isolated section of the system to atmospheric pressure and hold. If system pressure does not increase, then remove the compressor. The recovered refrigerant may encompass acids, moisture and oils and every air conditioning or refrigerating system should be secure by a pressure relief device. 
5 0
3 years ago
________ is used to install and update software, backup, and restore mobile devices, wipe employer software and data from device
erastovalidia [21]

Answer: MDM softwares

Explanation:

Here MDM refers to mobile device management software which provides people with the facilities of updating, installing creating backup of various mobile devices within an organisation. Moreover these software's provides tools for proper monitoring and to report their usage across various independent mobile device users. MDM is often used or interconnected with the term BYOD(Bring your own device), whereby employees of an organisation bring their own mobile devices and they are being managed by a MDM software centrally.

8 0
4 years ago
Two electronics students are discussing static electricity and electric current. Student A says that a basic property of static
Svet_ta [14]
The answer is D. Only student B is correct. Student A is incorrect because static electricity can be detected through the principle of electrostatic induction, which will indicate if there are static electricity on the surface of an object. A device which can detect static electricity is an electroscope. Moreover, for student B, it is correct that the cause for electric current to flow is the uniform flow of free electrons.
3 0
3 years ago
The key invention that enabled computers to go into every home and office is
tatiyna

The answer is the microprocessor


7 0
3 years ago
Other questions:
  • Question 4 of 10
    5·1 answer
  • A ________ -tier design includes a middle layer between the client and server that processes the client requests and translates
    11·1 answer
  • What do you think of explaining to young people, from high school, the legitimacy of copyright and the dangers they can run on t
    11·1 answer
  • 12. Which of the following is a complex formula?
    13·2 answers
  • Which software would you use to create a print design?
    8·2 answers
  • A _____ attack is designed to generate a lot of activity on a network by flooding it with useless trafficenough traffic to overw
    14·2 answers
  • Question Mode Matching Question Match the following description with the appropriate programming language generation. 1GL 1GL dr
    7·1 answer
  • What techniques can be used to assess a product?
    12·2 answers
  • When a virtual machine is
    9·1 answer
  • List of rules for expert systems​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!