1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
STALIN [3.7K]
3 years ago
9

The factorial of n is equal to ______.

Computers and Technology
1 answer:
alexdok [17]3 years ago
5 0

Answer:

n! = n*(n-1)*(n-2)*(n-3)* ... *2*1

Explanation:

The factorial operator is simply a mathematical expression of the product of a stated integer and all integers below that number down to 1.  Consider these following examples:

4! = 4 * 3 * 2 * 1

4! = 12 * 2 * 1

4! = 24

6! = 6 * 5 * 4 * 3 * 2 * 1

6! = 30 * 4 * 3 * 2 * 1

6! = 120 * 3 * 2 * 1

6! = 360 * 2 * 1

6! = 720

So, the factorial of n would follow the same as such:

n! = n * (n-1) * (n-2) * ... * 2 * 1

Cheers.

You might be interested in
The ________________ Act requires Internet sales to be treated in the same way as mail-order sales (e.g., collect sales tax from
BARSIC [14]

Answer:

Internet Tax Freedom Act

Explanation:

The Internet Tax Freedom Act was signed into law in 1998 by President Bill Clinton and has since been reviewed until the Permanent Internet Tax Freedom Act was passed into law on the 9th of June, 2015 by President Barrack Obama.

The Act requires that internet sales are equally treated as mail-order sales.

5 0
3 years ago
What is payload?
Elina [12.6K]

Answer:

a block of data inside the paket

4 0
3 years ago
For what purpose do the hackers create the zombies army?
enyata [817]

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

5 0
3 years ago
Katherine would like to insert specific words at the top of every page on a multipage essay.
vekshin1

The correct way to insert specific words at the top of every page of a multi page essay is the third option - Type the words onto the first page after selecting the header region of the document by clicking the top edge of the page; it will automatically be repeated in all subsequent header regions of the document.

The steps in the third choice are correct for inserting a header. You should also keep in mind that you can also set the header so that it does not start until the second page, which may be appropriate for an essay.

6 0
3 years ago
Read 2 more answers
\what security countermeasures can you enable on your wireless access point (wap) as part of a layered security solution for wla
dmitriy555 [2]
The security countermeasure that one can enable on a wireless access point as part of the layered solution for WLAN implementations would be to disable 802.1x . It is the one that provides a WEP and is very unsecure. Another is to change the SSID and to set the broadcast of the SSID to off.
5 0
3 years ago
Other questions:
  • Locker doors There are n lockers in a hallway, numbered sequentially from 1 to n. Initially, all the locker doors are closed. Yo
    15·1 answer
  • C programming:
    10·1 answer
  • What is an example of asynchronous communication
    7·1 answer
  • A technician is talking to end users about the specifications for an upgraded application server. The users of the application r
    11·1 answer
  • By Carl Sandburg
    6·1 answer
  • Any fact or set of facts, such as the words in a letter to a friend or the notes in a song, can become computer ____.
    7·1 answer
  • To give your app users the ability to open your app directly from other apps by clicking a link, you should use:.
    11·1 answer
  • Design a class named Employee. The class should keep the following information in member variables:
    5·1 answer
  • What is the output by the code system.out.print(8-4+2);
    13·1 answer
  • Programmers use an Integrated Development Environment (IDE) to write software programs, because:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!