1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
r-ruslan [8.4K]
3 years ago
14

The input to the following algorithm is a positive integer. The goal is to find the digit in the hundreds place of the integer.

(For example, if we input 28398, we want the algorithm to output 3.)
Below is the proposed algorithm, but the values of X and Y are missing:

Step 1: Divide the input by X. Call the quotient and ignore the remainder.

Step 2: Now divide by Y. Ignore the quotient and call the remainder

Step 3: Return

What X, Y will allow this algorithm to correctly find the hundreds digit of the input? Put X in the first blank and Y in the second blank.

Note: We would say that has a quotient of 2 and a remainder of 1.
Computers and Technology
2 answers:
Serggg [28]3 years ago
4 0
The first division should reduce the hundreds digit to the units digit by dividing by 100.  Ignoring remainder means ignoring the previous units and tens digits.
The second division, where we keep the remainder is to extract the units digit by ignoring the quotient.  So we divide by 10.  The discarded digits are the tens and higher digits.

max2010maxim [7]3 years ago
3 0

Answer:

X = 100 and Y = 10

Explanation:

Let's do the example, where input = 28398

Step 1: Divide the input by 100. Call the quotient and ignore the remainder.

28398/100 = 283.98, quotient = 283, remainder = 89

Step 2: Now divide by 10. Ignore the quotient and call the remainder  

283/10 = 28.3,  quotient = 28, remainder = 3

Step 3: Return 3

You might be interested in
A technically qualified individual who may configure firewalls and IDPSs, implement security software, diagnose and troubleshoot
sineoko [7]

Answer:

Security technician

Explanation:

Security technicians are responsible for fixing, planning, and implementing the IT and computer security system of organisations by making sure the safety and security of the data and information of the clients as well as the employees that make daily use of the systems

Security technicians administer security access to the clients and employees of the organization and are responsible for being up to date with the latest IT security technology developments.

7 0
3 years ago
What are the two ways to print a document?
guajiro [1.7K]

Answer:

ctrl+p or find the print button on the page

5 0
3 years ago
Renee just got on the freeway to go to her cousin's house in Denver. She is driving 50 miles per hour. Her sister Kim left one h
defon

let's say they catch-up to each other after t hour.

so

in t hour distance travelled by Renee

d = speed × time = 50t

in t hour distance travelled by Kim

d = speed × time = 60(t-1) + 0×1 = 60(t-1)

Note: here kim didn't covered any distance in first hour and in rest t-1 hour it travelled all distance

now.as distance travelled by both is same so

60(t-1) = 50t

60t -60 = 50t

adding 60 both sides

60t = 50t+60

subtracting 50t both sides

60t -50t = 50t+60 - 50t

10t = 60

dividing by 10 both sides

t = 60/10 = 6

so in 6 hour both will catch-up to each other

3 0
3 years ago
CODING IN C++ URGENT HELP PLEASE
forsale [732]

Answer:

this is hard i thought i knew it wow u have hard stuff in your school

Explanation:

7 0
3 years ago
Which of these is not used by analysts when adopting CASE tools? (1 point) (Points : 1.5) communicating more effectively with us
mojhsa [17]

Answer: expediting the local area network

Explanation: Case tools are the tools or service that helps in the software development but the automatic activity. This tool can be applied on various applications like mobile apps, E-commerce websites etc.

Analyst focus on the features like improving productivity ,low time consumption,integration of the work and making the communication better with the users ,helps in producing large amount of the documents etc.

The only factor not accepted by analyst is accomplishing the operation in the LAN(local area network) as it does not facilitates this operation because it is not software development process.

4 0
3 years ago
Other questions:
  • What is a critique of the feature detector model of object recognition?​?
    8·1 answer
  • I want to work on cloud computing and i need some help on how to start ?
    6·1 answer
  • Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of ciph
    7·1 answer
  • Sue needs to add a header and a footer to a presentation. Which process should she use to do this?
    10·2 answers
  • Write a statement that outputs variable numObjects. End with a newline.
    6·1 answer
  • How to use repl.it css
    7·1 answer
  • Mention 3 components that can be found at the back and front of the system unit​
    6·1 answer
  • On which tab are the print commands in Excel 2016 accessed?
    7·2 answers
  • write an assembly program that uses the output compare function of a timer to toggle an led every second
    6·1 answer
  • Which is true for comments? Group of answer choices The compiler does not generate machine code for comments. The compiler conve
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!