1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
a_sh-v [17]
4 years ago
11

Two floating point numbers, A and B, are passed to a recursive subroutine.

Computers and Technology
1 answer:
Mnenie [13.5K]4 years ago
6 0
The answer is (c) infinite loop
You might be interested in
If a disk drive has 8 surfaces and there are 1024 tracks per surface with 256 sectors per track and 512 bytes/sector. What is th
Elza [17]

Answer:

The capacity of the drive in Gigabytes equals 1.0737 Gbs

Explanation:

Given there are 1024 tracks per surface.

Number of surfaces = 8

Hence number of tracks in 8 surfaces equals 1024\times 8=8192 tracks

Now it is given that there are 256 sectors per track thus the number of sectors in 8192 tracks equals 8192\times 256=2097152 sectors

Now it is given that there are 512 bytes per sector thus the number of bytes in 2097152  equals 2097152\times 512=1073741824 bytes

Converting to gigabytes the capacity of the drive in gigabytes equals 1.0737Gbs

5 0
3 years ago
Emma is creating a database to track sales. She wants to be able to sort by price and sales associate. And she would like to loo
alexira [117]

Barcode number, description, price, and sales associate.

5 0
3 years ago
Read 2 more answers
How do network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS) differ?an NIDS focuses more
balandron [24]

Answer:

a. NIDS focuses more on analyzing incoming traffic, while an HIDS monitors valuable OS files

Explanation:

Intrusion detection system is used in analyzing, detecting, and raising alarm on suspicious network activities used by hackers to access unauthorized sites. Network intrusion detection system is meant to work in real-time, so as to analyze incoming traffic. Packets moving across the network are evaluated for threats.

Host intrusion detection system work within the operating system of the device to evaluate the history of system files that could contain threats, or unusual file permission changes, and then raise an alarm.

3 0
3 years ago
What did major networks do to combat audience erosion in the 1990s?
S_A_V [24]

Answer: I think is 3. They acquired cable channels. They acquired cable operators.

Explanation:

6 0
4 years ago
Computer science question down below
Pachacha [2.7K]

It would be A

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • What are the functions of a motherboard??
    6·1 answer
  • What symbol do we use to denote a character?
    9·2 answers
  • Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop shou
    5·1 answer
  • How do I delete my brainly account?<br> I don't need anymore.
    13·2 answers
  • Which of the following is not a data in python. float, integer, bool, str.​
    14·1 answer
  • A proposal is also known as a
    14·2 answers
  • Iam trying to find a way to code in Scratch that will let me take away the first two and last two letters of a word. For example
    15·1 answer
  • In a mobile app for computer technicians in a large college, an initial trigger event could be ____.
    7·1 answer
  • Compare the freedom available to the American media with the freedom available to media in other parts of the world. How does a
    8·1 answer
  • Write a short program that asks the user to enter a month &amp; prints a message based on the month
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!