1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
3 years ago
12

What is the final amount stored in value if the computer selects 17 as the

Computers and Technology
1 answer:
nadya68 [22]3 years ago
6 0

Answer: -17

Explanation:

Our random number is 17. Let's go through line by line.

  1. value is a random number picked which is 17
  2. valueB = 17 / 2 = 8.5
  3. If value is greater than 0 AND value has a remainder of 1, we will set the value to value* -1.
  4. Value is now 17 * -1 = -17

Let's quickly calculate value mod 2. 17 % 2 = is 1. If you're wondering how we did that, the remainder after dividing 8 into 17 twice is 1, because 17 - 16 = 1.

We stop after line 4 because we stop the conditional statement after one condition is filled.

You might be interested in
2. How can recovery handle transaction operations that do not affect the database, such as the printing of reports by a transact
Reil [10]

Answer:

Explanation:

great question but dont know

7 0
4 years ago
Twenty staff members will be doing data entry activities from 10 p.m. to 3 a.m. on a regular basis. You could check if a given o
Alex

Answer:

load testing

Explanation:

to see if the activity can handle under performance

5 0
3 years ago
Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
kakasveta [241]

Answer:

It is called a WPS brutal force attack.

Explanation:

Wired and wireless networks are both susceptible to attacks. The wired network, the advantage as a cable connection, is more secure than wireless networks, but wireless network also have security measures like the wifi protected set up (WPS).

WPS is used to connect to a network without passphrase, but with a key combination or a PIN.

Brutal force attacks are used on WPS to forcefully generate the PIN, using a third party software.

3 0
3 years ago
State and explain ten features of the standard toolbar as in computing.
Anastasy [175]

Answer:

Hi. I'm glad to help you.

Explanation:

1. New blank document: It helps the user to create a new blank document or sheet.

2. Open: It allows the user to open or find a file.

3. Search: It is used to find files, folders and webpages.

4. Cut: It removes the current selection to the clipboard.

5. Copy: It copies the selection to the clipboard.

6. Print preview: It shows how a file will look like when printed.

7. Insert hyperlink: This command allows the user to insert a new hyperlink or edit the selected hyperlink.

8. Zoom: Adjusts the size that the document appears on the screen.

9. Document Map: It displays the document map for the current document.

10. Format Painter: It copies the cell format allowing it be pasted elsewhere.

<em><u>Hope it helps. Please mark as brainliest. </u></em>

4 0
3 years ago
Read 2 more answers
You have installed a device at the physical layer. All of the systems you connect to this device will talk to each other at the
9966 [12]

Answer: Hub

Explanation:

Hub is a electronic and networking device that is placed in a network to maintain a common link with the multiple attached devices. Hub is situated at the physical layer of the Open systems interconnection(OSI) model.

  • Hub is used for creation of link between numerous local area network sections as it persist various ports which replicates data packet and distributes to other ports.
  • There are different types of hub for different purpose of connection such as USB hub, Ethernet hub etc.  

8 0
3 years ago
Other questions:
  • Effective teams use strategies that help members work together a) smoothly b) independently c) loosely d) secretly
    5·2 answers
  • Use the image above to determine which toolbars will be displayed in the program you are using. SELECT ALL THAT APPLY
    11·2 answers
  • Charles would like to visit a specific page on the World Wide Web. How should he do it?
    10·1 answer
  • A system administrator suspects that there is an error in the replication configuration. How can the system administrator look f
    7·1 answer
  • Read the following scenario and decide whether it is fair use and why Donnie has a major paper do for school he finds a great we
    10·1 answer
  • Define ethical (include a link to the source of definition). Describe the ethical dilemma (issue) in this scenario.
    12·1 answer
  • Plz tell the answer I I'll mark u as the brainliest
    14·1 answer
  • Help pls nnnnnnnnnnnnnnnnnnnn
    15·1 answer
  • Paige is writing about the progress her team made in setting up a new software system. in one detail, she tells that the team co
    12·2 answers
  • O
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!