1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serjik [45]
3 years ago
10

C++ code-- Factorial Recursion

Computers and Technology
2 answers:
Aloiza [94]3 years ago
3 0
Handle the print outside of the factorial function, which only needs one userVal when called.

int factorial( int foo )
{
  if( foo == 1 )
   return 1;
 else
   return( foo * factorial( foo - 1 ) );
}
oksano4ka [1.4K]3 years ago
3 0

Answer:

void PrintFactorial(int factCounter, int factValue){

int nextCounter = 0;

int nextValue = 0;

if (factCounter == 0) { // Base case: 0! = 1

cout << "1" << endl;

}

else if (factCounter == 1) { // Base case: Print 1 and result

cout << factCounter << " = " << factValue << endl;

}

else { // Recursive case

cout << factCounter << " * ";

nextCounter = factCounter - 1;

nextValue = nextCounter * factValue;

printFactorial(nextCounter, nextValue);

}

}

Explanation:

The only things that is left is calling the recursive function in the else statement. It is the bolded command on the answer.

factCounter is the value we are multiplying. In the function, it is nextCounter. So for 5, it is 5, then 4, then 3, until 0...

factValue is the value of the factorial. In the function, it is nextValue So it is 5, then 5*4 = 20, then 5*4*3 = 60, then...

void PrintFactorial(int factCounter, int factValue){

int nextCounter = 0;

int nextValue = 0;

if (factCounter == 0) { // Base case: 0! = 1

cout << "1" << endl;

}

else if (factCounter == 1) { // Base case: Print 1 and result

cout << factCounter << " = " << factValue << endl;

}

else { // Recursive case

cout << factCounter << " * ";

nextCounter = factCounter - 1;

nextValue = nextCounter * factValue;

printFactorial(nextCounter, nextValue);

}

}

You might be interested in
All of the following are technical solutions to protecting user privacy except: Group of answer choices Data use policies Anonym
RoseWind [281]

Answer:

Data use policies

Explanation:

Technically data use policies are not specifically made to protect user privacy, however it also should not violate user privacy. Data use policies are required by law. They are compulsory disclosures that list the various ways in which data in the form of personal data of individuals is collected, shared or used by digital companies(companies that operate on the internet, make use of email lists, etc ) are used.

4 0
3 years ago
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra
Sergeu [11.5K]

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

8 0
4 years ago
Please add thenodes given below to construct the AVL tree show all the necessarysteps,
Paha777 [63]

Answer:

30,33,37,18,23,34,15,38,40,17

To construct the AVL tree, follow these steps and diagrams are shown in the image:

• Add 30 to the tree as the root node. Then add 33 as the right child because of 33 is greater than 30 and AVL tree is a binary search tree.

• Then add 37 as the right child of 33. Here the balance factor of node 30 becomes 0-2 = -2, unbalanced.

Use RR rotation, make node 33 the root node, 30 as the left child of 33 and 37 as the right child of 33.

• Now add 18 as the left child of 30. And 23 as the right child of 18. Here the balance factor of 30 becomes 2-0 = 2. It’s unbalanced.

Use LR rotation, make 23 the parent of 18 and 30.  

• Now add 34 as the left child of 37 and 15 as the left child of 18. Add 38 as the right child of 37. And then add 40 as the right child of 38.

• Now adding 17 as the right child of 15 makes the tree unbalanced at 18.

Use LR rotation, make 17 as the parent of 15 and 18.

Explanation:

The balance factor of a node can be either 0,1 or -1. Else the tree is called unbalanced at the node.

If the inserted node is in the left subtree of the left subtree of the unbalance node, then perform LL rotation.

If the inserted node is in the right subtree of the right subtree of the unbalance node, then perform RR rotation.

If the inserted node is in the left subtree of the right subtree of the unbalance node, then perform RL rotation.

If the inserted node is in the right subtree of the left subtree of the unbalance node, then perform LR rotation.

7 0
3 years ago
Which data storage or software tool is used to unify vast amounts of raw data of all types from across an organization
Korvikt [17]

A data lake is a type of repository that stores large sets of raw data of all types from across an organization.

<h2>What is a data lake?</h2>

A data lake is a central location in which to store all data, regardless of its source or format, for an organization at any scale.

<h3>Characteristics of a data lake</h3>

  • It is low cost, easily scalable, and are often used with applied machine learning analytics.

  • It allows to import any type of data from multiple sources in its native format, this allows organizations to scale in the size of the data as needed.

Therefore, we can conclude data lakes are a vital component in data management as it stores all data across an organization.

Learn more about data lakes here: brainly.com/question/23182700

4 0
3 years ago
Which internet resource can you use to publicly describe an adventure trip you recently made?
Hitman42 [59]
Itd Be Blog! Hope This Help Mate:)
7 0
3 years ago
Read 2 more answers
Other questions:
  • The mouse and keyboard are also sometimes called
    5·1 answer
  • Suppose list1 is an MyArrayList and list2 is a MyLinkedList. Both contains 1 million double values. Analyze the following code:
    8·1 answer
  • You are almost finished updating a Website. As part of the update, you have converted all pages from HTML 4.0 to HTML5. The proj
    7·1 answer
  • When you build a computer from parts, you usually start by deciding on which processor and motherboard you will use?
    11·1 answer
  • What will be result of below if statement.
    13·1 answer
  • Para ti que es el sexting​
    11·1 answer
  • Computer network reduces the cost. explain the statement with example.​
    8·1 answer
  • WHATS YALL FAVORITE GAME WHOEVER GIVES THE BEST ANSWER WINS 200
    13·2 answers
  • True or False: F Layout is better for users who read left to right, but layout is better for users who read right to left.
    13·1 answer
  • which filename refers to a 16-bit real-mode program that queries the system for device and configuration data, and then passes i
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!