1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yarga [219]
3 years ago
9

To generate integers between and including -10 to 10 you would use:

Computers and Technology
2 answers:
ollegr [7]3 years ago
8 0

Answer: I have no clue my dude use google

Explanation: go to google and look it up. ;) <3

Marina CMI [18]3 years ago
5 0
I’m pretty sure you would use multiplication don’t get mad if I’m wrong
You might be interested in
Write a recursive, int -valued function, len, that accepts a string and returns the number of characters in the string .
vodka [1.7K]
Without knowing the language, it's pretty imposible to write it.  Once you start thinking recursively, it's not a difficult problem.

While you're recursing, pass the string without the first character.
The base case would be a null string which would return 0.
The unwind would just add one and return that.
7 0
3 years ago
When setting quotas for disk space, what are the two tools for enabling and configuring quotas? and which of the two are the mor
lora16 [44]
NTFS quotas
File server resource manager.

A system admin has rights to set NTFS quotas if he or she is concerned with some users monopolizing a small amount of disk space. Activating NTFS quotas helps set a storage limit for users using a particular volume. Out of the two, file server resource manager is the most effective and flexible. It is best recommended to use file server resource manager if you need quotas. It comes with file-type filtering and includes folder-level quotas.
8 0
3 years ago
Why is it important not to leave your personal information on a public computer?
zheka24 [161]

Answer:

B. Someone can steal the information and hurt you.

Explanation:

People can hack into your accounts using your informations and spread hurtful things that can make people hurt. The people will think that you posted this (even if you didn't) and blame you.

7 0
2 years ago
Draw the cache tables and the state of all bits within them. Suppose you have a 16 byte cache with 2 byte long cachelines that i
andrey2020 [161]

Answer:

Detailed solution is given in attached diagram and the answers are given below:

Explanation:

(a) 4 bits are devoted for line sizing.

(b) 2 bits are devoted for indexing

(c) 1 bit is devoted for the tag

5 0
3 years ago
4) What is a desktop?​
DaniilM [7]
A desktop computer is a personal computer designed for regular use at a single location on or near a desk due to its size and power requirements.
3 0
1 year ago
Other questions:
  • Which pane displays commands that change relative to the activity taking place in the presentation window's main work area?
    15·1 answer
  • In some programming languages, such as C#, Visual Basic, and Java, every class you create is a child of one ultimate base class,
    8·1 answer
  • What does DOS stand for?
    15·1 answer
  • Each array in Java has a public field named ________ that contains the number of elements in the array.
    13·1 answer
  • Teachers can organize the classroom environment to facilitate activities and to prevent problems. True Or False
    15·1 answer
  • You just got a call from the University system administrator, who says that either you or your roommate is issuing denial-of-ser
    8·1 answer
  • Consider the following code:
    13·1 answer
  • Directions: SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN Java.
    11·1 answer
  • Examples of pop in computer​
    14·1 answer
  • You’ve been hired to help a bank automate their deposit/withdrawal system! Your task is to write a Python program that interacts
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!