Answer:
Call showValue (12)
Explanation:
The function is a block of the statement which performs the special task.
if you define the function, then you have to call that function.
Then, program control moves to the function and start to execute otherwise not execute the function.
the syntax for calling the function:
name(argument_1, argument_2,....);
we can put any number of arguments in the calling.
check the options one by one for finding the answer:
Call showValue( Integer): this is valid calling but it passes the variable, not the 12. this is not correct.
Call showValue( Integer 12): This is not valid calling, because it passes the data type as well which is incorrect.
Call showValue( Real): this is valid calling but it passes the variable, not the 12. this is not correct.
Call showValue (12): this valid calling and also pass the value 12.
Therefore, the correct answer is option b.
Answer:
Required memory size is 16k x 8
16k = 24 x 210 = 214
Hence, No. of address lines = 14
No. of data lines = 8
a) Size of IC 1024 x 1
Total number of ICs required = 16k x 8 / 1024 x 1 = 16 x 8 = 128
b) Size of IC 2k x 4
Total number of ICs required = 16k x 8 / 2k x 4 = 8 x 2 = 16
c) Size of IC 1k x 8
Total number of ICs required = 16k x 8 / 1k x 8 = 16 x 1 = 16
Explanation:
For a, 10 address lines from A0 to A9 are used to select any one of the memory location out of 1024 memory locations present in a IC.
For b, 11 address lines from A0 to A10 are used to select any one of the memory location out of 2k=2048 memory locations present in a IC.
For c, 10 address lines from A0 to A9 are used to select any one of the memory location out of 1k=1024 memory locations present in a IC.
Answer:
Create web and mobile applacations
Explanation:
Using an electronic signature on official documentation best illustrates the process of authentication
Further explanation:
The continuous rise of Electronic signatures has made it easier for people to accept signed documents by email or through electronic devices. One good example of electronic signatures is the implementation of digital signatures which broadly encompasses many types of electronic signatures out there. Digital signatures are unique to each signer and follow a standard authentication protocol called PKI. PKI use mathematical algorithms to generate what are known as private and public keys.
A good example is Bob and Jane. Jane sends an eSignature document using her private keys. Bob receives this document with an attached copy of Jane’s public key. The signature will be considered valid if the public key decrypts the signature correctly.
Learn more about eSignatures and electronic signatures.
brainly.com/question/8776017
#LearnWithBrainly
Can i have it don’t think i ever got one