1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anni [7]
3 years ago
5

a student writes a prgroma to find the factorial of a number. the factorial for a number n is defined as the product of all whol

e numbers between 1 and n, inclusive. while attempting to find the factorial for 120, the program's output is not what the student expectec. assuming that the program has been corectly written, what is a possible explanation for the incorrect output?
Computers and Technology
1 answer:
Tomtit [17]3 years ago
8 0

Answer:

B. Integers may be constrained in the maximum and minimum values that can be represented in a program because of storage limitations.

Explanation:

Since the program has been written correctly by the student and yet the output of the program is not what was expected, then the next possibility is that because of the limitations in storage, the integers may be constrained in the minimum and maximum values capable of being represented when writing a program.

You might be interested in
Please anyone, help me.... I'm not sure how to put these all together.<br> 35 points!
Vilka [71]

Answer:

#School Name

school_name = "Klein Cain"

# Asks for name

full_name = input("Please enter your full name ")

#Says Hello

print("Hello, ", full_name, "!!")

#Says the letters in your name

print("There is ", len(full_name), " letters in your name")

#Says final message

print("??? is a Cain where??? ", school_name)

7 0
3 years ago
Read 2 more answers
The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
lukranit [14]

Answer:

Encryption

Explanation:

Encryption is a term in the field of computer security (Cryptology) this is a process of encoding information in a way that hackers and eavesdroppers cannot read. The process of encryption involves a plain text (message) been converted into a scrambled text (cipher text) with an encryption algorithm (key) in this way, if the message is intercepted by a hacker he/she is unable to read the contents. Only the authorized party with a decryption key will be able to decrypt back to a plain text and read the contents of the message

3 0
3 years ago
What kind of physical device is an evil twin access point? What does the evil twin do after initial association when the victim
Rufina [12.5K]

Answer:

A PC such as a notebook computer.The evil twin gets the encrypted frame from the affected host,A VPN  encrypts a  frame with its own VPN key.

Explanation:

The evil twin after initial association when the victim client will establish a secure wireless connection with the victim client. The connection uses a key client-EF for encryption such that when the host transmits an encrypted frame it is transmitted to the evil twin. A VPN is an encrypted virtual private network used to access networks that are not trusted. The client encrypts a frame with a VPN key (Key Client-Server) which it shares with the server. The frame is further encrypted by the key it shares with the evil twin (Victim Client-ET) The evil twin will then receive a double encrypted frame. However, it will only be able to decrypt the Victim Client-ET key but not the VPN key hence it will not be able to read the message sent through the frame.

7 0
3 years ago
Give your definition of a view. Based on the Academic Database, identify and describe a scenario where it would be necessary to
il63 [147K]

Answer:

A database view is a searchable object in a database that is defined by a query. Though a view doesn't store data, some refer to a views as “virtual tables,” you can query a view like you can a table. A view can combine data from two or more table, using joins, and also just contain a subset of information.

Explanation:

A database view is a subset of a database that is based on a query that runs on one or more database tables. Database views are saved in the database as named queries and can be used to save complete queries that are frequently used.

7 0
3 years ago
In this lab, 172.30.0.0 represents the __________ network and 10.20.1.0 represents the _________ network.
umka21 [38]
172.30.0.0: private network
10.20.1.0: public network
6 0
3 years ago
Other questions:
  • The combination of two or more technologies or data feeds into a single, integrated tool is referred to as a _____.
    7·1 answer
  • A relational database is different from a simple database because it has more than one _____.
    13·1 answer
  • Which of the following refers to a collection of colors, fonts, and effects that can be
    6·1 answer
  • To print a budget:________.
    9·1 answer
  • Persuasion is when Someone speaks to crowd about love <br>○True<br>○False​
    10·1 answer
  • There are types of templates​
    5·1 answer
  • Which of the following variable names follows the rules for naming variables?
    13·1 answer
  • You were recently hired by a small start-up company. The company is in a small office and has several remote employees. You have
    15·1 answer
  • You have been asked to investigate a web server for possible intrusion. You identify a script with the following code. What lang
    10·1 answer
  • Explain the pros and cons of touchscreen, non-touchscreen, and hybrid devices:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!