1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stich3 [128]
4 years ago
15

Write the definition of a function half which recieves a variable containing an integer as a parameter, and returns another vari

able containing an integer, whose value is closest to half that of the parameter. (Use integer division!)
Computers and Technology
1 answer:
Alchen [17]4 years ago
5 0

Answer:

int half(int x){

int a=x/2;

return a;

}

Explanation:

function <em>half(x)</em> which has return type <em>integer</em> and accept an <em>integer </em>type parameter <em>'x'</em> and return the an <em>integer </em>value in variable <em>'a' </em>which is closest to <em>half</em>  that of the parameter '<em>x'</em>.

You might be interested in
What specific authentication method has no encryption for user credentials or data, and is not recommended for most applications
GrogVix [38]

Answer:

PAP authentication method

Explanation:

PAP known as Pass word authentication protocol Basically, PAP works like a standard login procedure; the remote system authenticates itself to the using a static user name and password combination, so not recommended for applications.

6 0
3 years ago
Write code to complete print_factorial()'s recursive case. sample output if user_val is 5: 5! = 5 * 4 * 3 * 2 * 1 = 120
maxonik [38]
```
#!/usr/local/bin/python3


import sys

def print_factorial( user_val ):
    if( user_val < 1 ):
        return( 1 )
    else:
        return( print_factorial( user_val - 1 ) * user_val )


if( __name__ == "__main__" ):
    if( len( sys.argv ) == 2 ):
        print( print_factorial( int ( sys.argv[ 1 ] ) ) )
    else:
        sys.stderr.write( "usage: %s <integer>\n" % sys.argv[ 0 ] )

    exit( 0 )
```

5 0
3 years ago
Its not letting me change my email, any way to fix this? Must include steps and how to fix this. (I am using a school email) ANS
AlexFokin [52]
You see, you just aren’t philosophical enough to understand an email. You don’t change the email, it changes you.
3 0
2 years ago
Do the pros of interpersonal communication via social media outweigh the cons? Explain.
JulijaS [17]
Well in my opinion is that yes they do. The ability to be able to communicate with others so far way really helps society advance towards the future. And i cant stress of how the benefits of being able to share ideas with well anyone is so wonderful.

I hope this helps.
6 0
3 years ago
Read 2 more answers
Two stations running TCP/IP are engaged in transferring a file. This file is 1000MB long, the payload size is 100 bytes, and the
weeeeeb [17]

Answer:

a. 2100

b. 2199

Explanation:

GIven that:

The file size = 1000 MB

The  payload size is  = 100 bytes

The negotiated window size is = 1000 bytes.

This implies that the sliding window can accommodate maximum number of 10 packets

The sender receives an ACK 1200 from the receiver.

Total byte of the file is :

1000 MB = 1024000000 bytes

a.

Sender receives an ACK 1200 from the receiver but still two packets are still unacknowledged

=1200 + 9 * 100

= 1200 +  900

= 2100

b. What is the last byte number that can be sent without an ACK being sent by the receiver?

b. Usually byte number starts from zero, in the first packet, the last byte will be 99 because it is in 1000th place.

Thus; the last byte number send is :

= 1200 + 10 *100 -1

= 1200 + 1000-1

= 1200 + 999

= 2199

6 0
4 years ago
Other questions:
  • Which type of operation writes the file system structure to the disk?
    5·1 answer
  • 6.
    15·1 answer
  • Consolidating a system's physical and time resources is known as ________________.
    13·1 answer
  • In a flow chart, both the decision structure and the repetition structure use the diamond symbol to represent the condition that
    9·1 answer
  • 1. Bones do not change position when the muscles contract and release.
    7·1 answer
  • Which two tasks are responsibilities of a network administrator?
    8·1 answer
  • A computer connected to the Internet that asks for data is a(n) ________. Select one: A. server B. client C. aggregator D. surro
    8·1 answer
  • Write a calculator program using a switch statement that: a) Prompts the user to enter two numbers b) Prompts the user to select
    6·1 answer
  • Which expression is equivalent to 3x + 3x + 3x?<br><br> From Performance Matters
    11·2 answers
  • Take a minute to reflect on your thoughts and learning so far and discuss:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!