1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faltersainse [42]
3 years ago
15

The Fibonacci numbers are the numbers

Computers and Technology
1 answer:
Doss [256]3 years ago
6 0

Answer:

function fibonacci(n):

  if n is equal to 1 or n is equal to 2:

       return 1

  else:

       return fibonacci(n-1) + fibonacci(n-2)

end of the function

Input the n

Print fibonacci(n)

Explanation:

* The above algorithm (pseudocode) is written considering Python.

Create a function called fibonacci that takes one parameter, n

If n is equal to 1 or 2, return 1 (When n is 1 or 2, the fibonacci numbers are 1)

Otherwise, return the sum of the two previous numbers (When n is not 1 or 2, the fibonacci number is equal to sum of the two previous numbers)

Ask the user for n

Call the function, pass n as a parameter and print the result

You might be interested in
Discuss the benefits of a system safety effort other than improved safety
klio [65]

Answer: Safety effort of system is defines as the measures that are taken to provide and maintain the protection of the system.There are several methods ,tool and efforts made for the system security .Benefits of the system security are as follows:-

  • Takes control over the hazardous situation and maintain the security
  • System security will also increase the development of the system easily.
  • Approach towards the analyzing of the system function
  • Data, information and functions are safe from being detected in unauthorized way.
  • Functions and implementation is made easy without the fear of getting attacked or hacked.

8 0
3 years ago
In a block-style business letter, the paragraphs are double-spaced and indented. <br> True or False
Sav [38]
I am pretty sure it is true
5 0
3 years ago
Read 2 more answers
To view the contents of a file that was compressed with the bzip2 utility, you must used the ____________________ command.
bekas [8.4K]

Answer:

zcat

Explanation:

Zcat is a command line utility for viewing the contents of a compressed file without literally uncompressing it. It expands a compressed file to standard output allowing you to have a look at its contents. In addition, zcat is identical to running gunzip -c command.

8 0
3 years ago
Name of main component of fifth generation of computer​
e-lub [12.9K]

Answer:In the fifth generation, VLSI technology became ULSI (Ultra Large Scale Integration) technology, resulting in the production of microprocessor chips having ten million electronic components. This generation is based on parallel processing hardware and AI (Artificial Intelligence) software.

Explanation: hope this helps ❤️

3 0
3 years ago
A network technician is able to connect the switches between two offices, but the offices cannot communicate with each other, as
Contact [7]

Answer:

C) Router

Explanation:

In computer networking, the router's function is to stand in between diferent data lines and control the flow of data packets.  When a packet arrives from one direction, it reads the address information in the header to determine its direction. Note that the data lines will contain different IP addressing scheme, so considering the scenario in the above question, since the offices use different IP schemes, a router will serve the purpose of directing data packets to allow communication.

6 0
3 years ago
Other questions:
  • How to open CD port in PC lenovo ideapad 330​
    14·1 answer
  • To save the changes to the layout of a table, click the Save button on the _____.
    13·1 answer
  • Object Linking and Embedding (OLE) data integration allows you to
    8·1 answer
  • Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output tho
    9·1 answer
  • Which method of accessing FTP has the most limited capabilities?
    9·2 answers
  • Who is the father of computer​
    12·2 answers
  • What expressions will initialize d with a random value such that all possible values for d are given by the inequality 1.5 ≤ d &
    8·1 answer
  • Write a program in c++ that plays a number guessing game with a Human user. The Human user will think of a number between 1 and
    7·2 answers
  • Several of the items below indicate the steps required to move a slide to a different location in a presentation. Select those s
    14·1 answer
  • "Na2SO3” represents sodium sulfite.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!