1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
4 years ago
10

Write code that causes a "triangle" of asterisks of size n to be output to the screen. specifically, n lines should be printed o

ut, the first consisting of a single asterisk, the second consisting of two asterisks, the third consisting of three, etc. the last line should consist of n asterisks. thus, for example, if n has value 3, the output of your code should be
Computers and Technology
1 answer:
stealth61 [152]4 years ago
4 0
Like this
#include <stdio.h>void  pa(int n){ if(!n){  printf("\n");return;}printf("*");pa(n-1);}void lines(int n){if(!n)  return;lines(n-1);pa(n);}int   main(void){lines(5);return 0;}
You might be interested in
How do governments correct for negative externalities?
tia_tia [17]

Answer:

C. They can impose fines for the damage or ensure that businesses do not cause such damage in the first place.

Explanation:

6 0
3 years ago
A_________ formal access control methodology used to assign a level of confidentiality to an information asset and thus restrict
Illusion [34]

Answer:

1. Data classification scheme

Explanation:

<h2><u>Choose an answer from the options. </u></h2>

A<u> data classification scheme</u> formal access control methodology used to assign a level of confidentiality to an information asset and thus restrict the number of people who can access it

6 0
4 years ago
Many application controls are useful for enhancing the reliability of both transaction data and master record data. This applica
Rzqust [24]

Answer:

True

Explanation:

In most accounting software like SAP, Application control performs what is known as validity check.

And Validity check is when this application control compares the data entered into a field for a transaction to that in a master record to verify the data entered exists.

With above definition we can infer that the question statement is true.

5 0
3 years ago
2- There are many different design parameters that are important to a cache’s overall performance. Below are listed parameters f
katen-ka-za [31]

Answer:

1. 2588672 bits

2. 4308992 bits

3. The larger the data size of the cache, the larger the area of ​​memory you will need to "search" making the access time and performance slower than the a cache with a smaller data size.

Explanation:

1. Number of bits in the first cache

Using the formula: (2^index bits) * (valid bits + tag bits + (data bits * 2^offset bits))

total bits = 2^15 (1+14+(32*2^1)) = 2588672 bits

2. Number of bits in the Cache with 16 word blocks

Using the formula: (2^index bits) * (valid bits + tag bits + (data bits * 2^offset bits))

total bits = 2^13(1 +13+(32*2^4)) = 4308992 bits

3. Caches are used to help achieve good performance with slow main memories. However, due to architectural limitations of cache, larger data size of cache are not as effective than the smaller data size. A larger cache will have a lower miss rate and a higher delay. The larger the data size of the cache, the larger the area of ​​memory you will need to "search" making the access time and performance slower than the a cache with a smaller data size.

5 0
3 years ago
Plz answer it’s timed
MAVERICK [17]

Answer: the third one

Explanation:

just trust me, the other ones dont mke sense to what I know about the subject, which is a lot

7 0
3 years ago
Other questions:
  • To close the header or footer, you should press the ________ key(s) on your keyboard.
    8·1 answer
  • Create a list with 5 numbers and find the smallest and largest number in the list and also the sum and product of the numbers in
    9·1 answer
  • Complete the static method stringSearch, which returns a String that tells where the first occurrence of the characters (chr) we
    12·1 answer
  • What happens when text is added to grouped objects that is larger than an object ?
    9·2 answers
  • Karen works in a department store. Her coworker gave diverse cultural backgrounds. Which statement shows that Karen understand t
    14·1 answer
  • Write code that prints: Ready! firstNumber ... 2 1 Run! Your code should contain a for loop. Print a newline after each number a
    15·1 answer
  • The notes added to slides can be seen during the presentation. TRUE OR FALSE​
    13·1 answer
  • Consider this C Program C++ Program Java Program or C# Program. It reads integers from the
    8·1 answer
  • Heyyyyyy<br> byeeeeeeeeeeeeeeeeeeeeeee
    15·2 answers
  • The which command _________________. a. can only be used to search for executables b. searches for a file in all directories sta
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!