1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zepelin [54]
2 years ago
11

What is the output of the following program when the method is called with 4?

Computers and Technology
1 answer:
wolverine [178]2 years ago
8 0

Answer:

C. ?????

Explanation:

Given code:

void unknown(int n)

{

if(n>0)

unkown(n-1);

System.out.print("?");  

}

Calling code: unknown(4)

This is a recursive invocation of unknown function and causes ? to be printed 5 times once each for following values of n.

  • unknown invocation with n=4
  • unknown invocation with n=3
  • unknown invocation with n=2
  • unknown invocation with n=1
  • unknown invocation with n=0

When n becomes 0, termination condition is reached and the function returns.

So the output is ?????

You might be interested in
You enter information by keying it into the??​
Greeley [361]

Answer:

password and username

Explanation:

3 0
2 years ago
Read 2 more answers
Aaron bought a photo-editing software package for personal use. He makes two copies of the software, in case the original softwa
Korvikt [17]

Aaron's action is considered legal, as you are allowed to make a backup copy of a legal copy of a software, but it can only be used in case the original software is destroyed or unusable.

5 0
3 years ago
Describe IT infrastructure. What is the role of business intelligence in determining the technology needs of a business?
mixas84 [53]

Explanation:

 The term IT infrastructure refer to an enterprise which is basically a collection of various hardware, software, network components, data network and data centers that are being used to do some development, testing related to IT related services. So the major components of IT infrastructure are:

1) Hardware solutions

2) Software Solutions

3) Various Network Component

4) Data Centers

Business Intelligence is basically a technology driven process that is being used analyze various data and the information in more effective and more informed way. The role of business Intelligence is given in following points:

1) Business Intelligence plays a vital role in identifying the technology required for our business.

2) As we knew that Business Intelligence is technology driven, so technology identification is major part that is being done my this process

3) With business Intelligence we chose the best technology required for our business, its help in increasing the profit of the business.

4) We can business Intelligence is the major process that deal with identifying all the technology needs of the business

8 0
2 years ago
​Five elements that can prove the genuineness of a user. What you know, what you have, what you are, what you do, and where you
nataly862011 [7]

Authentication factors are the factors that describe about the ingenuition or origination of the user. This is the tag that tells about the actuality of user that is getting connected with internet by the five elementals.

Hope this helps!

8 0
2 years ago
Make absolutely no changes to main(). Change function backwards so that the elements of the array are swapped in order for eleme
makkiz [27]

Answer:

i got you hold on.

Explanation:

5 0
2 years ago
Other questions:
  • If you place a semicolon after the test expression in a while loop, it is assumed to be a(n) ________. a. pre-test loop b. post-
    9·1 answer
  • What are the three fundamental principals of mnemonics? <br><br>HELP FASTTT!
    15·1 answer
  • To add or remove space before or after a paragraph, users should select.
    9·2 answers
  • 2. Given the following list, write a snippet of code that would print the individual elements of the list using the indexes of t
    13·1 answer
  • Jake was working on an essay for his English class on a stormy Sunday afternoon. Before he could save his document, a big strike
    8·1 answer
  • I'd: 9872093250, password: qqqqq, join the meeting​
    11·1 answer
  • Write at least complete set of HTML code to hyperlink to “Home.html”..
    8·1 answer
  • File:///media/fuse/drivefs-0142e6928396ed2afff070ead0fbbbcd/root/JerooLessonFourLabA_1.pdf
    6·1 answer
  • What is a Computer ?and it's demerits​
    13·2 answers
  • The computer stores currently used programs and data in ________.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!