1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariulka [41]
3 years ago
9

When should recursion be avoided?

Computers and Technology
1 answer:
Maru [420]3 years ago
7 0

Explanation: Recursion is the process in which the solution to any particular problem is based on the sub-part of the same problem/question. This is the method which is used in the situation when there is high complexity and calling of the function can be done by its own code in a particular program.

It makes the program code hard to handle and unreadable.The debugging process of the code also becomes difficult. The stack during the recursion process gets filled completely.These feature of the recursion makes it less efficient and thus, its avoided.

You might be interested in
(PLEASE HELP)
Harman [31]

Answer:ummm ok

Explanation:

4 0
3 years ago
Most presentation programs allow you to save presentations so they can be viewed online by saving them as ____
Elza [17]

Explanation:

Most presentation programs allow you to save presentations so they can be viewed online by saving them as html

files.

5 0
3 years ago
Read 2 more answers
Write a main method that prompts the user for an integer between 1 & 10 (inclusive). If the user enters an invalid number, p
stepan [7]

Answer:

int main() {

   int n;

   cout<<"Enter the integer n"<<endl;

   cin>>n;

   if(n<1 || n>10)

   {

       while(n>10 || n<1)//taking input if the number is not within range..

       {

           cout<<"Enter the number again"<<endl;

           cin>>n;

       }

       activity(n);//calling activity with the n..

   }

return 0;

}

Explanation:

Above written is the main function in which a prompting an integer between 1 and 10 if it is not within range then again taking input.Then after that calling activity with n as argument.

5 0
3 years ago
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number ca
Zielflug [23.3K]

Answer:

Option (B) i.e., Hash is the correct option.

Explanation:

A hash value is the number that has the fixed length and the data recognition is uniquely. It is also a type of file that is read by the special type algo, it uses the value of the bits in the following computer files which is used to manipulates the single number. That's why the following option is correct.

7 0
3 years ago
A student who used a regression model that included indicator variables was upset when receiving only the following output on th
jeka57 [31]

Answer:

This is a multicolinearity problem and the student should determine the variable(s) that cause(s) the problem and remove it.

Explanation:

This information means that there exists a linear combination between the independent variables. The problem might have developed due to multicolinearity producing almost perfectly linearly dependent columns.

This could also be as a results of single matrix created when the student use an incorrect indicator variables and included an additional indicator column which created linearly dependent columns.

4 0
3 years ago
Other questions:
  • What three components make up a film camera?
    14·2 answers
  • Consider two sets S1 and S2 of size 3 and 2 each.
    13·1 answer
  • ----------HELP WITH 3 QUESTIONS FOR 30 POINTS!!!---------
    6·1 answer
  • Which note-taking method quickly captures and organizes information?
    9·2 answers
  • One of your clients has opened a branch office in another state. Both the main office and the new branch office have fast, relia
    10·1 answer
  • John was carrying on at the water cooler the other day, trying to show off his knowledge of networking. He claimed that the comp
    10·1 answer
  • People using commercially available software are usually asked to read and agree to a(n) _____
    10·1 answer
  • One of the most common encryption protocols in use today. It is an asymmetric protocol that enables the sharing of a secret key
    7·1 answer
  • How do i make spaces in python<br> To draw hello world
    15·1 answer
  • What is bigger that terbites
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!