Answer:
typing on a keyboard (input) makes letter appear on a screen (output)is removing that
Every digit of a hex number is converted to 4 binary digits.
hex digits are { 0, 1, 2, .., A, B, .., F }.
2 in hex is equal to 0010 in binary.
D is equal to 1101.
so the answer is 00101101 or C.
Answer:
Following are the program in c++ language
#include <iostream> // header file
using namespace std;// namespace
int main() // main function
{
int num; // variable declaration
long int f=1; // variable declaration
do
{
cout<<"Enter the Positive value:";
cin>>num;
} while(num<0); // i check whether number is non negative or not
while(num>0) // iterating over the loop
{
f=f*num; // calculate the factorial
num--; // decrement the value of num by 1
}
cout<<" factorial is :"<<f; // display the factorial .
return 0;
}
Output:
Enter the Positive value:7
factorial is :5040
Explanation:
Following are the description of the program .
- Read the input by user in the "num" variable of "int" type..
- The do-while will check the enter number is nonnegative number.
- While(n>0) loop is calculating the factorial in the "f" variable .
- Finally display the factorial .
The answer is Every six months
A battery acts as the brain of a car and is used to power almost everything. It can last up to five years. However, this lifespan will depend on how well the battery is maintained and the type of weather conditions you live in. Aim to check your car battery at least twice a year. Actually, it is best to check your battery regularly and not to wait for your mechanic to test your battery during routine servicing.
Answer:
False
Explanation:
Namedroppers help you look for domain names that are constantly updated on a daily basis. You can purchase a domain name of your choice from the results of the available domain names that are populated by namedropper. The description from the question above belongs to web application vulnerability scanners. These scanners are automated to scan web apps and look for vulnerabilities that most attackers take advantage of like SQL injection and buffer overflows.