1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhenek [66]
3 years ago
8

What does the binary odometer show about representing large numbers?

Computers and Technology
1 answer:
mel-nik [20]3 years ago
6 0

Explanation:

We will start exploring large place values to see what happens when a big number gets too big. Go to the Binary Odometer Widget on Level 2 of the lesson on Code Studio.

This is a widget that simulates a car odometer - a device that tracks how far the car has driven (in miles or kilometers). Explore the odometer to understand how it works.

You might be interested in
Brainless is one the way if you help
V125BC [204]

Answer:

1. x - 6

2. p - ? = 7

i chose these equations because

a number - 6 = the weight of your backpack.

p - an unknown number without a substitute variable = slices of bread left.

3 0
2 years ago
Write a program consisting of: a. A function named right Triangle() that accepts the lengths of two sides of a right triangle as
Lunna [17]

Answer:

The java program is as follows.

import java.lang.*;

public class Triangle

{

   //variables to hold sides of a triangle

   static double height;

   static double base;

   static double hypo;

   //method to compute hypotenuse

   static double rightTriangle(double h, double b)

   {

       return Math.sqrt(h*h + b*b);

   }

public static void main(String[] args) {

    height = 4;

    base = 3;

    hypo = rightTriangle(height, base);

 System.out.printf("The hypotenuse of the right-angled triangle is %.4f", hypo);

}

}

OUTPUT

The hypotenuse of the right-angled triangle is 5.0000

Explanation:

1. The variables to hold all the three sides of a triangle are declared as double. The variables are declared at class level and hence, declared with keyword static.

2. The method, rightTriangle() takes the height and base of a triangle and computes and returns the value of the hypotenuse. The square root of the sum of both the sides is obtained using Math.sqrt() method.

3. The method, rightTriangle(), is also declared static since it is called inside the main() method which is a static method.

4. Inside main(), the method, rightTriangle() is called and takes the height and base variables are parameters. These variables are initialized inside main().

5. The value returned by the method, rightTriangle(), is assigned to the variable, hypo.

6. The value of the hypotenuse of the triangle which is stored in the variable, hypo, is displayed to the user.

7. The value of the hypotenuse is displayed with 4 decimal places which is done using printf() method and %.4f format specifier. The number 4 can be changed to any number, depending upon the decimal places required.

8. In java, all the code is written inside a class.

9. The name of the program is same as the name of the class having the main() method.

10. The class having the main() method is declared public.

11. All the variables declared outside main() and inside another method, are local to that particular method. While the variables declared outside main() and inside class are always declared static in java.

4 0
3 years ago
How do you protect the server from modification by non-root users?
Elis [28]

Answer:

We can protect the server from the modification by using the non root users in many ways as follows:

  • By modifying the PHP settings in the server and by using the configured file as, the configuration of the file is basically depend upon the linux and the PHP script.
  • By disabling the URL from the function of file handling that basically accept the local file as the parameters but it also accept the URL.  It can even now get to outer destinations by utilizing fsockopen or any of the CURL capacities.
  • The safe mode  of PHP is presumably probably the best alternative to secure your server however it very well may be prohibitive. Whenever initiated, experimental mode averts access to records not claimed by Apache and access to condition factors and execution of double projects are likewise debilitated.

4 0
3 years ago
Which job role requires you to set up an internet system access
user100 [1]

indeed I think it is correct

4 0
3 years ago
Reusing internal and external components and behaviors maintains a consistent approach
boyakko [2]

<u>Reuse:</u> reusing internal and external components and behaviors maintains a consistent approach.

<h3>What is an e-waste?</h3>

An e-waste is the abbreviation for electronic waste and it can be defined as any electrical or electronic device that have been discarded because they are no longer functional and useful.

This ultimately implies that, e-waste are generally destined for disposal, resale, reuse, refurbishment, or recycling in the long run.

However, the burning of wires from e-waste extracts the following toxic components that are hazardous to human health:

Polybrominated flame reta-rdants

  • Mercury
  • Lead
  • Barium
  • Cadmium

Read more on recycling here: brainly.com/question/25024898

#SPJ1

8 0
1 year ago
Other questions:
  • How many 32 bit integers can be stored in 16 byte cache block in matlab?
    15·1 answer
  • What leadership style involves the ideas of advice others
    6·1 answer
  • When a range of IP addresses is set aside for client devices, and one of these IPs is issued to these devices when they request
    14·1 answer
  • A loop that repeats a specific number of times is known as a(n):
    9·1 answer
  • Write code that inserts userItem into the output string stream itemsOSS until the user enters "Exit". Each item should be follow
    5·1 answer
  • When records are in ____ order, they are arranged one after another on the basis of the value in a particular field.?
    9·1 answer
  • If the variable letter has been defined as a char variable, which of the following are not valid assignment statements to assign
    8·1 answer
  • Write a program to input a number and check whether it is even or odd number
    7·1 answer
  • Giving out 15 points to whoever answers early!
    7·2 answers
  • Choose a problem that lends to an implementation that uses dynamic programming. Clearly state the problem and then provide high-
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!