Answer:
In Python:
def gcd(m,n):
if n == 0:
return m
elif m == 0:
return n
else:
return gcd(n,m%n)
Explanation:
This defines the function
def gcd(m,n):
If n is 0, return m
<em> if n == 0:
</em>
<em> return m
</em>
If m is 0, return n
<em> elif m == 0:
</em>
<em> return n
</em>
If otherwise, calculate the gcd recursively
<em> else:
</em>
<em> return gcd(n,m%n)</em>
<em />
<em>To call the function to calculate the gcd of say 15 and 5 from main, use:</em>
<em>gcd(15,5)</em>
Answer:
Aye dog I don't know nothing about code, yes its true, but I hope that you get an answer for you!
Explanation:
Facts...
Answer:
computer file is a computer resource for recording data discretely in a computer storage device. Just as words can be written to paper, so can information be written to a computer file. Files can be edited and transferred through the internet on that particular computer system.
{{5,10,15,20},{25,30,35,40}} is answer where zero is not found.
<u>Explanation:</u>
This program finds zero in giving as arrays of value as a parameter. The program has two loop. One is a row of the array and the other is column loop for each row o an array. For loop is created with a variable namer row and the loop ends with a length of the array of each row.
In side row for loop col loop is created and loop ends with each row-column length of cells. If data in each cell i.e (row, col) calue is zero it returns true and the loop is terminated immediately.
In case if the value of the cell doesn’t found zero it never terminates the loop and continuous loop and returns a false value. Find Zero functions accept the two-dimensional array and check whether cell value is zero. If it is zero found return true otherwise it returns false.
Answer: (C) Ransomware
Explanation:
The ransomware is one of the type of malware software design which is used for blocking the user accessing unauthorized and also without paying money.
The most of the ransomware software encrypt the computer accessing and the files as they demand for the payment dues for again restoring the access.
It also encrypt the user account and the information until the correct decrypt key are get entered into the system. So, according to the given situation, the ransomware attack are experienced in an organization.
Therefore, Option (C) is correct.