1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bond [772]
3 years ago
13

Give a real life of an if statement

Computers and Technology
1 answer:
bogdanovich [222]3 years ago
7 0

Answer:

If Joe wants to eat an apple then he eats an apple.

Explanation:

The if statement checks if Joe "wants to eat an apple", if it turns out he does not then nothing will happen.

You might be interested in
A power supply serves as both a rectifier and transformer to convert AC house current to DC and to step down voltage from 110 V
ohaa [14]

Answer:

True

Explanation:

A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user.

Generally, a computer is composed of five (5) main components and these include;

I. Input unit.

II. Output unit.

III. Central processing unit (CPU).

IV. Storage (memory) unit.

V. Power supply unit (PSU).

A power supply also referred to as power supply unit (PSU) can be defined as a hardware component of a computer that converts and step-down the domestic alternating current (AC) electrical power to a low-voltage regulated direct current (DC) power, so that the internal components of a computer can be supplied with power.

Hence, the power supply unit (PSU) serves as a rectifier by converting alternating current (AC) house current to direct current (DC) and as a transformer to step-down voltage from 220 Volts or 110 Volts to 50, 30, or 20 Volts depending on the requirements of a computer.

8 0
3 years ago
Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authen
Ivahew [28]

Answer:

The answer is "Confidentiality".

Explanation:

Data Security is also known as protection against unauthorized computer access, files, and pages through digital information protection. The protection of data also prevents data from bribery.  

  • It applies to both the security of data from unwanted entities being obtained.
  • It allows accessing sensitive data, which may be able to do so.
4 0
3 years ago
Compare Fibonacci (recursion vs. bottom up)
ipn [44]

Answer:

C++ code explained below

Explanation:

#include<bits/stdc++.h>

#include <iostream>

using namespace std;

int FiboNR(int n)

{

int max=n+1;

int F[max];

F[0]=0;F[1]=1;

for(int i=2;i<=n;i++)

{

F[i]=F[i-1]+F[i-2];

}

return (F[n]);

}

int FiboR(int n)

{

if(n==0||n==1)

return n;

else

return (FiboR(n-1)+FiboR(n-2));

}

int main()

{

long long int i,f;

double t1,t2;

int n[]={1,5,10,15,20,25,30,35,40,45,50,55,60,65,70,75};

cout<<"Fibonacci time analysis ( recursive vs. non-recursive "<<endl;

cout<<"Integer FiboR(seconds) FiboNR(seconds) Fibo-value"<<endl;

for(i=0;i<16;i++)

{

clock_t begin = clock();

f=FiboR(n[i]);

clock_t end = clock();

t1=double(end-begin); // elapsed time in milli secons

begin = clock();

f=FiboNR(n[i]);

end = clock();

t2=double(end-begin);

cout<<n[i]<<" "<<t1*1.0/CLOCKS_PER_SEC <<" "<<t2*1.0/CLOCKS_PER_SEC <<" "<<f<<endl; //elapsed time in seconds

}

return 0;

}

7 0
3 years ago
The piece of hardware that contains the circuitry that processes the information coming into the computer and tells the other ha
Aleksandr-060686 [28]
The central processing unit
6 0
3 years ago
Question 2 Unsaved Which of these is NOT an example of an emerging technology? Question 2 options: Sixth Sense Close Range Drone
alexandr1967 [171]

The answer is <em>B.) Close Range Drones</em>

I just took the test

3 0
3 years ago
Other questions:
  • Why is television reactive, requiring no skills or thinking
    11·1 answer
  • Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
    7·1 answer
  • Category 6 is an example of a ________ used to connect wired network devices.
    9·1 answer
  • PLEASE HELP!!!!
    7·1 answer
  • The most useful index fossils are of organisms that are still alive today.
    11·2 answers
  • Having friends who cause you stress can decrease your happiness, which can in turn
    13·2 answers
  • Ask the user to input a number less than 100. Print all the numbers from that number to 100.
    6·2 answers
  • g Which of the following factors primarily determines how the Internet is used in different countries? A. local attitude to info
    6·1 answer
  • Which field would best function as a primary key for a table that tracks orders?
    11·2 answers
  • A mesh network topology allows all computers to be directly connected. True or False
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!