1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olasank [31]
3 years ago
8

Refer to the method f: Public int f( int k, int n ) { if( n == k ) return k; else if( n > k ) return f( k, n - k ); else retu

rn f( k - n, n ); } What value is returned by the call f( 6, 8 )?
Computers and Technology
1 answer:
Debora [2.8K]3 years ago
5 0

Answer:

Returned value: 2

Explanation:

Public int f(int k, int n) {

   if (n == k)

       return k;

   else if (n > k)

       return f(k, n - k);

   else return f(k - n, n);

}

/////////////////////////////////////////////////////////////////////////////////////////

Trace of function calls,

f(6, 8)

f(k, n - k) -> (6, 2)

f(k - n, n) -> (4, 2)

f(k - n, n) -> (2, 2)

return k

You might be interested in
Question:
Vlad1618 [11]

Answer:

The file type that uses equations instead of pixels are D.EPS or vector files

Explanation:

3 0
3 years ago
if you earn $8 per hour after taxes are taken out of your paycheck and your insurance is $200 a month, how many hours will you h
kiruha [24]
It sounds like you answered your own questions. But $223.20 x4 weeks is $893.60. Pay your $200 insurance and have $693.60 left over. Working 25 hours gets you to $200, but working 30 hours will ensure you have enough after taxes.
8 0
3 years ago
Which of the following is considered the necessary research done before launching a scan?
wolverine [178]

Answer:

A. Network Reconnaissance.

Explanation:

Network Reconnaissance is a process of testing for vulnerability in a network. It could be a legitimate testing by a network operator to protect the network, setting acceptable user policies or a attacker finding a way to the network. In this process, intrusion detection mostly gives alarm on every reconnaissance activities.

To launch a scan in a network, an operator must have in mind to either carry out a reconnaissance activity or scan for network Reconnaissance attacks.

6 0
3 years ago
Why is it so difficult to correctly identify a new product or process as emerging technology
Ymorist [56]
<span>Technology is inherently difficult to manage because it is constantly changing, often in ways that cannot be predicted.</span>
5 0
3 years ago
A company wishes to begin the process of implementing a multi-party system and is looking for other companies with similar inter
Andre45 [30]

If a company wishes to begin the process of implementing a multiparty system using block-chain, this provides Trust among the organizations.

<h3>What is a block chain?</h3>

A block chain is a listing of records referred to as blocks. Cryptography is used to link the blocks collectively.

Beginning a process of implementing a multi-party system provides trust among the organization, and not ownership, intent or uniqueness.

Read more about <em>systems </em>here:

brainly.com/question/14364696

7 0
2 years ago
Other questions:
  • Which of the following need to be assessed during unit testing?
    11·1 answer
  • Enzymes_____________.
    7·1 answer
  • A(n) ____ is a service from local telephone companies in which up-to-date telephone facilities at the telephone company s centra
    9·1 answer
  • What are the two ways that assets are
    5·1 answer
  • A student opens a recently purchased software package and begins reading the enclosed materials. What information might be inclu
    6·1 answer
  • Create a program that finds (n+1)! -factorial- of an integer n in C++.
    13·1 answer
  • A gamer typing their name into the computer is an example of:
    14·2 answers
  • Need help with a program to search to sort elements in an array.(increasing or decreasing order)
    8·1 answer
  • You have been elected to assist the school's yearbook committee and newspaper club in purchasing new computers. The current comp
    10·1 answer
  • What changes could you make so that a message, "User input deemed invalid." during designing a simple calculator program for you
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!