1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ValentinkaMS [17]
4 years ago
14

A sentinel value ________ and signals that there are no more values to be entered:____

Computers and Technology
1 answer:
Hoochie [10]4 years ago
5 0

Answer:

The answer is "Option b".

Explanation:

Sentinel [..] is a special value, which existence ensures the end of a loop, which performs structured data. It allows the information end to be identified where no other means are available for this, and wrong choices can be described as follows:

  • In option a, It is a special value, not a data type, that's why it is not correct.
  • Option c and Option d both were wrong because, It is an empty list, and it can't indicate the starting point of the list and guards the list.  
You might be interested in
A personal business letter is a letter that is ____.
Simora [160]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

8 0
3 years ago
Your primary responsibility as a systems analyst concerns:_____.
Leni [432]

Main Answer:

Your primary responsibility as a system analyst concerns :b.people

Sub heading:

what does a system analyst do?

Explanation:

1. A System analyst is responsible for monitoring the effectiveness of technology systems and analysing it's efficiency for business operation and clients'needs.

2.system analyst create specific modifications

Reference Link:

https\\brainly.com

Hashtag:#SPJ4

7 0
2 years ago
Sophia's plays her favorite game on her phone, where the game uses the phone's
nirvana33 [79]

Answer:

Augmented Reality

Explanation:

Augmented reality is a camera to overlay images on real-world scenery. Basically what the Pokemon GO app does.

8 0
1 year ago
What is TLB for? Why TLB? Given the following number, what is theeffective memory access time?
vodomira [7]

Answer:

A lookaside buffer translation (TLB) is a memory cache that reduces the time it takes to access a user memory place. TLB includes the most lately used page table entries.

TLB is used to overcome the issue of sizes at the time of paging. Page Table Entry (PTE) is used for framing the memory ,but it uses two references one for finding  the frame number and the other for the address specified by frame number.

<u>Formula for finding effective memory access time-</u>

Effective Memory Access Time = (TLB access_time+Memory Access Time)*hit ratio + (TLB access_time+2*Memory Access Time)*(miss ratio)

Given in question,

Hit ratio = 0.90

Memory Access Time = 150ns

TLB access time= 5ns

Effective Memory Access Time = (TLB access_time+Memory Access Time)*hit ratio + (TLB access_time+2*Memory Access Time)*(miss ratio)

                            =(5+150) * 0.90 + (5+2*150)*(1-0.90)

                             =155 * 0.90 + (305*0.1)

                             =139.5 + 30.5

                             = 170ns

8 0
3 years ago
What are the two types of lighting?
RideAnS [48]

The answer to this question is E

7 0
4 years ago
Read 2 more answers
Other questions:
  • Race conditions are possible in many computer systems. Consider a banking system with two methods: deposit(amount) and withdraw(
    14·1 answer
  • Which one of the following provides an authentication mechanism that would be appropriate for pairing with a password to achieve
    13·1 answer
  • Pls help........
    15·1 answer
  • Why is proper planning important?
    10·1 answer
  • How many pieces are there in a normal laptop??? Good luck and solve carefully
    9·1 answer
  • Open IDLE. Create a new script file (File--&gt;New File, Ctrl n on Windows, Cmd n on macOS). On the first line, place your name
    6·1 answer
  • This instrument records seismic waves on a roll of paper. The recording is called a(n) _____.
    8·1 answer
  • What is Identity Theft?
    8·1 answer
  • Use USB in a sentence
    15·2 answers
  • What type of os must be installed on your machine to allow this type of action by another person?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!