1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zepelin [54]
3 years ago
11

What is the output of the following program when the method is called with 4?

Computers and Technology
1 answer:
wolverine [178]3 years ago
8 0

Answer:

C. ?????

Explanation:

Given code:

void unknown(int n)

{

if(n>0)

unkown(n-1);

System.out.print("?");  

}

Calling code: unknown(4)

This is a recursive invocation of unknown function and causes ? to be printed 5 times once each for following values of n.

  • unknown invocation with n=4
  • unknown invocation with n=3
  • unknown invocation with n=2
  • unknown invocation with n=1
  • unknown invocation with n=0

When n becomes 0, termination condition is reached and the function returns.

So the output is ?????

You might be interested in
Steps to customize theme of desktop
Gnom [1K]

Answer:

Choose Start > Control Panel > Appearance and Personalization > Personalization. Right-click an empty area of the desktop and choose Personalize. Select a theme in the list as a starting point for creating a new one. Choose the desired settings for Desktop Background, Window Color, Sounds, and Screen Saver

Explanation:

4 0
3 years ago
Read 2 more answers
"during the ________ stage of system development, system specifications that were prepared during the design stage are translate
Paraphin [41]
The correct answer is programming
Hope this helps! :)
5 0
4 years ago
What would best describe the future of cybersecurity?
Andrei [34K]

The best describe the future of cybersecurity is strong security policies offer little protection.

<h3>What is cybersecurity?</h3>

Cybersecurity is the security of data or computer systems. Cybersecurity is provided from the hackers that hacks the data and money online.

As everything is converting digital, the need of cybersecurity is increasing.

Thus, the correct option is B.

Learn more about cybersecurity

brainly.com/question/27560386

#SPJ1

5 0
2 years ago
When writing professional emails, it is okay to use emoticons and
nekit [7.7K]

Answer:

False

Explanation:

8 0
3 years ago
Read 2 more answers
Convert the decimal number -17 to binary (2's complement)
Katarina [22]

Answer:

1111111111101111

Explanation:

The binary representation of 17 is 0000000000010001.

In order to get the binary representation of -17 we need to calculate the 2's complement of 0000000000010001.

Step 1 : 1s complement of 0000000000010001 = 1111111111101110

Step 2 : 2s complement => 1111111111101110 + 1 = 1111111111101111

This actually corresponds to the negative of the original number which was 17.

So the 2s complement representation of -17 is 1111111111101111 .

6 0
4 years ago
Other questions:
  • Frank works for an organization that wishes to install a software program on a single server with multiple users connected. Whic
    8·1 answer
  • Write a method that returns a new array by eliminating the duplicate values in the array using the following method header: Publ
    6·1 answer
  • Which of the following does not correctly declare an ArrayList?
    8·1 answer
  • Which remote access configuration option should you choose if you want mobile users to be able to make a secure connection to th
    9·2 answers
  • Write the definition of a method named add that receives a reference to a Scanner object associated with a stream of input consi
    13·1 answer
  • Moore’s law states that the number of transistors on integrated circuits doubles approximately every two years?
    15·2 answers
  • Internet Security: How can you work securely on the internet? What actions should be avoided and what are the pitfalls?
    9·1 answer
  • What is not true about field properties in Access?
    13·1 answer
  • Which menu enables you to add content to the table of contents?.
    15·1 answer
  • Mike logged into a shopping website and entered his username and password. Which protocol will the website use to verify his cre
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!