1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RUDIKE [14]
3 years ago
7

A recursive method may call other methods, including calling itself. A recursive method has:

Computers and Technology
1 answer:
kap26 [50]3 years ago
8 0

Answer:

Hence the answer is given as follows,

Explanation:

Base Case:-  

If (num == 0) //This is the base case for the given recursive method  

return 1;  

If(num % 2!=0) checks whether num is odd.  

The above condition is true for all odd numbers and false for even numbers.  

if the remainder is not equal to zero when we divide the number with 2 then it is odd.  

The method:-  

The above recursive method calculates the product of odd numbers up to the given range(that is num)  

For num=5   => 15(5*3*1).  

For num=7   => 105(7*5*3*1).  

For num=10 => 945(9*7*5*3*1).

You might be interested in
Which two programming languages require the program to be converted into executable code using a compiler? (Choose two.)
forsale [732]

Answer:

C# and Java

Explanation:

Compiler can be regarded as a program that helps in transforming a source code( source program) to another program knowns as machine code. Some of the programming languages that needs a compiler are C# and Java. The compiler will collect the the set of instructions of the new program that was written using high level language and translate it into machine language.

8 0
3 years ago
Which of the following is planted on an infected system and deployed at a predetermined time?A. Logic bombB. Trojan horseC. Worm
nekit [7.7K]

Answer:

A. Logic Bomb.

Explanation:

A Logic Bomb is a piece of code that is planted in a software system that is infected intentionally to set off malicious function.They are deployed at a predetermined time.

For ex:- a programmer hiding the files that deletes details of the employee who left the company.So these files can never be deleted.

4 0
3 years ago
When each nonprimary key attribute is identified by the whole key, the relation is said to be in at least:
Oksana_A [137]

Answer:

Second Normal Form

Explanation:

Normalization is  key to efficient database design. It assures that database systems are not inaccurate, slow, and inefficient and they might not produce the information you expect, The two main objectives of the normalization are; eliminate redundant data (storing the same data in more than one table) and ensure data dependencies make sense,

In the second normal form data, which does not directly dependent on table’s primary key is moved into another table.

6 0
3 years ago
What is the smallest floating number can be represented in C++? -3.4*10^38
melisa1 [442]

Answer:

FLT_MIN.

Explanation:

In C++ FLT_MIN is used to represent the smallest floating point number.You have to include two libraries for FLT_MIN to work and these are as following:-

limits.h

float.h

for example:-

#include <iostream>

#include<limits.h>

#include<float.h>

using namespace std;

int main() {

   cout<<FLT_MIN;

return 0;

}

Output:-

3.40282e+38

8 0
3 years ago
What would be the best thing you could do to prepare yourself to work for a company that has embraced globalization?
Nesterboy [21]

Answer:

C.Study different organizational structures

Explanation:

The best thing you could do to prepare yourself to work for a company that has embraced globalization is to <u>study different organizational structures.</u>

This would help you to gather knowledge about different organizational working structures and figure out planing strategies to deal with each organization accordingly.

It helps in effective and efficient work output.

I hope the answer was helpful.

Thanks for asking.

3 0
4 years ago
Other questions:
  • Write code statements that prompt for and read a double value from the user, and then print the result of raising that value to
    15·1 answer
  • Help me find the difference between these logos
    10·2 answers
  • a ____ is a feature that finds a list potential design problems associated with your document brainly.com
    14·1 answer
  • Is Missouri a free state or a slave state​
    13·2 answers
  • Please choose the correct citation for the case which established the "minimum contacts" test for a court’s jurisdiction in a ca
    10·1 answer
  • FREEFREEFREEFREEFREEFREE
    11·2 answers
  • HELP PLSSS I WILL MARK U!!!!
    10·2 answers
  • Please elp i will give you brainelst answer the question and answer please!!!!!!!!!!!!!!!!
    15·1 answer
  • Which of the following is a sign that a website is inappropriate?
    11·2 answers
  • What is the binary conversion of 179.187.223.21?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!