1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erik [133]
2 years ago
13

. If you executean infinite recursive function on a computer it will executeforever.

Computers and Technology
1 answer:
S_A_V [24]2 years ago
4 0

Answer:

b. False

Explanation:

If you execute an infinite recursive function on a computer it will NOT execute forever.

You might be interested in
Yo who do u add a pic on here
Juliette [100K]
Go to the me colum when you first open the app
8 0
3 years ago
Which statements accurately describe tropical rain forests
sattari [20]

The tropical rain forest is a forest of tall trees in a region of year-round warmth. An average of 50 to 260 inches of rain falls yearly. Rain forests belong to the tropical wet climate group.

Explanation:

  • The temperature in a rain forest rarely gets higher than 93 °F or drops below 68 °F. The average humidity is between 77 and 88%, rainfall is often more than 100 inches a year. In monsoonal areas, there is a real dry season.
  • Rainforests now cover less than 6% of Earth's land surface. Tropical rainforests produce 40% of Earth's oxygen.
  • About 1/4 of all the medicines we use come from rainforest plants. Curare comes from a tropical vine, is used as an anesthetic and to relax muscles during surgery. Quinineis used to treat malaria.
  • There are four very distinct layers of trees in a tropical rain forest. They are the emergent, upper canopy, understory, and forest floor.
  • The soil of the tropical rainforests is shallow, poor in nutrients and without soluble minerals. Years of rainfall have washed away the nutrients in the soil obtained from weathered rocks.
  • The tropical rain forest can be found in three major geographical areas around the world.
  • Central America in the the Amazon river basin.  Africa - Zaire basin, with a small area in West Africa. Indo-Malaysia - west coast of India, Assam, Southeast Asia, New Guinea and Queensland, Australia.
7 0
3 years ago
Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c
TiliK225 [7]

<u>Explanation:</u>

<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.

a. Cindy may learn the difference between these two techniques used to create a malware attack:

  • through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
  • through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.

b. Here are some common suggestions;

  • Never open attachments from strange email addresses.
  • install a paid antivirus software.
  • be mindful of websites with too many ads.
4 0
2 years ago
Consider Ron’s budget. How much money does Ron have left over each month?
vladimir1956 [14]
What is Ron’s budget?
4 0
2 years ago
Read 2 more answers
Double[][] vals = {{1.1, 1.3, 1.5},
Elis [28]

Answer:

Option 3 i.e., 7.3 is the correct answer to the following question.

Explanation:

In the following two dimensional array that is the double data type 2-D array variable "val" and it contains some float type information in the form of matrix that has 4 rows and 3 columns, In the following statement, they asked the value of 4th row and 2nd column and in the matrix 4th row and 2nd column contain the value i.e., 7.3.

3 0
3 years ago
Other questions:
  • Credit card numbers follow a standard system. For example, Visa, MasterCard, and Discpver Card all have 16 digits, and the first
    11·1 answer
  • The publisher tab in the application control allows you to manage the various certificates that are used to do what to binaries?
    8·1 answer
  • Use the following data definitions data myBytes BYTE 10h,20h,30h,40h myWords WORD 3 DUP(?),2000h myString BYTE "ABCDE" What will
    9·1 answer
  • Access time is:________.
    11·1 answer
  • A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To ac
    14·2 answers
  • Write a function maxTemp which takes a filename as string argument and returns the maximum temperature as float type for the wee
    13·1 answer
  • Drag the correct type of update to its definition.
    13·1 answer
  • Where can i watch bnha movie 2 online for free, with no sign up or pay?
    6·2 answers
  • What is a function of Agile software development?<br>​
    7·1 answer
  • The Uniform Electronic Transmission Act (UETA) a. declares that e-signatures are invalid. b. has only been adopted in a handful
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!