1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
3 years ago
15

If the user enters 26 what is output? _____________

Computers and Technology
1 answer:
MArishka [77]3 years ago
3 0

Please write the whole question, is it asking for the function that requests user input?

You might be interested in
John is runnig his Database application on a single server with 24 Gigabytes of memory and 4 processors. The system is running s
spayn [35]

Answer:

Vertical Scaling

Explanation:

Vertical scaling means the ability to increase the capacity of existing hardware or software by adding resources. In this case, more GB is added (8GB) to the server to address the problem. So vertical scaling is the resultant type john is expecting.

3 0
3 years ago
Draw a flowchart that ask the user to enter number: if the number is less than then 10 number it is doubled if the number is mor
solong [7]

Answer:

please find the attachment of the flowchart.

Explanation:

In this question, a start block is used to start the program, in the parallelogram box we input the value from the user end and in the diamond box, we check the input is not equal to 0. In the next diamond box, it checks the given input value and print value, and at the last, we stop the code.

Please find the program and its output in the attached file.

8 0
3 years ago
A.
FrozenT [24]

Answer:

b. the action is not allowed.

Explanation:

Traffic signs are established rules and regulations designed to direct and guide commuters and other road users.

A red circle and diagonal slash on a sign simply means that the action is not allowed.

A hortatory technique is focused on encouraging, exhorting and urging people to do that which is right, acceptable and worthy of emulation by others.

For example, commuters and road users are being urged not to litter the highway with thrash, waste, or dirt, in order to protect the planet from environmental degradation and pollution. This would help in conserving and mitigating risks posing as a threat to our dear planet and habitat.

Hence, a hortatory technique in policy implementation and enactment is primarily aimed at appealing to the sense and conscience of individuals, to engage in socially responsible acts.

7 0
3 years ago
What is spam? electronic junk mail e-mail abuse e-mail subscriptions the e-mail server the opt out feature unethical use of e-ma
expeople1 [14]

Answer:

electronic junk mail.

Explanation:

7 0
3 years ago
1. You want to find if TCP/IP Services are working properly on your Computer, you would use which command? a. PING LOCALHOST b.
Olegator [25]

Answer:

Option A

Explanation:

Option B is rejected because it is used to get the startup network settings, processes extra features used by the network.

Option C is rejected because it is used to check the stats like ping,fps of the network by using a loop back.

Option A is selected because PING command is used to check the data packets transfer rate between two ends using ICMP protocol. Local host means that you are specifying the one end as your side. If the packets are there then it is working else the IP service is down.

3 0
4 years ago
Other questions:
  • The Freemont Automobile Factory has discovered that the longer a worker has been on the job, the more parts the worker can produ
    11·1 answer
  • What must be done to translate a posttest loop expressed in the form
    9·1 answer
  • What is a digital certificate? Select one: a. It is a means of establishing the validity of an offer from a person, entity, web
    7·1 answer
  • Sometimes, fourth-generation languages (4GLs) are called procedural languages
    9·1 answer
  • A technician is configuring a new SOHO multifunction wireless router at a customer’s location to provide network access to sever
    12·1 answer
  • What does a computer do with what it receives from the interpreter?
    14·1 answer
  • Design a class named Person with fields for holding a person’s name, address, and telephone number. Write one or more constructo
    12·1 answer
  • The most common clefs for high notes are what?
    6·2 answers
  • According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?
    7·2 answers
  • This project must target a Unix platform and execute properly on our CS1 server.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!