1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
3 years ago
11

PLEASE HELP!! Computer science test

Computers and Technology
1 answer:
tatiyna3 years ago
6 0

Answer:

See Explanation

Explanation:

Given

The attached function

What the recursion does is that; it adds up individual digits from N to 0

Solving (a): Each output when N = 6

For N = 6.

The function returns the following values:

f(6) = 6

Then: 6 + f(5)

Then: 6 + 5 + f(4)

Then: 6 + 5 + 4 + f(3)

Then: 6 + 5 + 4 + 3 + f(2)

Then: 6 + 5 + 4 + 3 + 2 + f(1)

Then: 6 + 5 + 4 + 3 + 2 + 1 + f(0)

Then: 6 + 5 + 4 + 3 + 2 + 1 + 0 = 21

Solving (b): The output when N = 7

Using the same process in (a) above.

The output is 28

You might be interested in
Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual. Wh
777dan777 [17]
There might be insufficient storage space so your computer usually takes a longer time to load.The bigger your file, the longer it takes to load. So the solution is to clear up your storage space



7 0
3 years ago
How to know if java is installed on a server.
Leokris [45]

Answer:

Sorry, I don't know the answer.

Explanation:

mungkin kamu sendiri tau jawabannya

6 0
2 years ago
Enter just the letter of the correct answer
FromTheMoon [43]
The correct answer is firewall
7 0
3 years ago
In common practice, how often do incremental data backups usually occur? hourly daily weekly monthly
Makovka662 [10]

Incremental backups usually occur weekly.

6 0
3 years ago
Meg logs into her email account without entering her user ID and password manually every time. She also finds results from searc
lianna [129]

Answer: auto completion

Location

Explanation:

Based on the information given, Meg should disable (auto completion) of sensitive information such as her username and passwords and she should also disable the option to track her (location) in her web browser.

When auto completion is disabled, then she will have to enter her user ID and password manually every time she wants to login. Also, disabling the option to track her location will help in safeguarding her personal information.

7 0
2 years ago
Other questions:
  • When would you use a composite primary key? Group of answer choices
    9·2 answers
  • What type of wireless connection requires an unobstructed "line of sight" between transmitter and receiver?
    8·1 answer
  • Create a story that depicts the events leading up to a vehicle crash fatality, the crash itself, and the emotional aftermath on
    9·1 answer
  • This is more opinionated than question-based.
    7·1 answer
  • HELP PLS TIME LIMIT HERE
    11·1 answer
  • Why does my inbox keep getting notifications and then disappearing?
    15·2 answers
  • What is the definition of the word uproot?
    15·1 answer
  • The term packet is used fairly generically to refer to protocol data unit (PDU). There are PDU equivalent names in the different
    15·1 answer
  • Why is making a model, or prototype, important in the design process?
    6·1 answer
  • Common names for computer-based information systems are transaction processing, management information, ________, and executive
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!