1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ladessa [460]
3 years ago
13

Complete the function to return the factorial of the parameter using recursion.

Computers and Technology
1 answer:
Klio2033 [76]3 years ago
7 0

def recursiveFactorial(number):

   if number > 1:

       return number * recursiveFactorial(number-1)

   else:

       return 1

stringNum = input("Enter a positive integer: ")

num = int(stringNum)

print(recursiveFactorial(num))

You might be interested in
Define a function compute_gas_volume that returns the volume of a gas given parameters pressure, temperature, and moles. Use
jeyben [28]

Question:

Define a function compute_gas_volume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the gas equation PV = nRT, where P is pressure in Pascals, V is volume in cubic meters, n is number of moles, R is the gas constant 8.3144621 ( J / (mol*K)), and T is temperature in Kelvin.

Answer:

This solution is implemented in C++

double compute_gas_volume(double P, double T, double n){

   double V = 8.3144621 * n * T/P;

   return V;

}

Explanation:

This line defines the function, along with three parameters

double compute_gas_volume(double P, double T, double n){

This calculates the volume

   double V = 8.3144621 * n * T/P;

This returns the calculated volume

   return V;

}

To call the function  from the main, use:

<em>cout<<compute_gas_volume(P,T,n);</em>

<em />

<em>Where P, T and n are double variables and they must have been initialized</em>

5 0
3 years ago
List the various cases where use of a NULL value would be appropriate.
melomori [17]

Answer:

The answer is below

Explanation:

There are cases where the use of a NULL value would be appropriate in a computer programming situation. These cases can be summarily described below:

The first case is in a situation where the value of the attribute of a certain element is known to exist, but the value can not be found

The second case is in a situation where the value of the attribute of a certain element is not known whether it exists or not.

4 0
3 years ago
What best describes the purpose of occupational safety and health Administration
IRISSAK [1]

Under the Occupational Safety and Health Act of 1970, employers are responsible for providing safe and healthful workplaces for their employees. OSHA's role is to help ensure these conditions for America's working men and women by setting and enforcing standards, and providing training, education and assistance.

5 0
3 years ago
Read 2 more answers
A polyalphabetic cipher uses many ___
Greeley [361]

Answer:d) Mono-alphabetic substitution rules

Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.

Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.

3 0
3 years ago
What is the maximum rate at which computers A and B can communicate, via router X? (your answer should be in Mbps)
eduard
450Mbps on the 2.4GHz band and 1300Mbps on the 5GHz band
7 0
4 years ago
Other questions:
  • When powering off your computer is best down using?
    8·2 answers
  • The development of a new information system is economically justified if the _____.
    5·2 answers
  • I don't know the answer and I tried different ones and they not what the book is looking for.
    7·1 answer
  • What enables a website to recognize a computer as a return visitor (as opposed to a first-time visitor)?
    12·1 answer
  • ________________ occur when a system produces incorrect, inconsistent, or duplicate data.
    6·2 answers
  • There is an enormous amount of information on the Internet that is automatically separated into good content and not-so-good con
    15·1 answer
  • If we can lock a file, we can solve the race condition problem by locking a file during the check-and-use window, because no oth
    14·1 answer
  • In ____________________ testing, security personnel simulate or perform specific and controlled attacks to compromise or disrupt
    10·1 answer
  • Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
    8·1 answer
  • There are many potential risks associated with the internet. what do we call the distribution and access of illegal copies of di
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!