1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blsea [12.9K]
3 years ago
7

X274: Recursion Programming Exercise: Cannonballs Spherical objects, such as cannonballs, can be stacked to form a pyramid with

one cannonball at the top, sitting on top of a square composed of four cannonballs, sitting on top of a square composed of nine cannonballs, and so forth.
RequireD:
Write a recursive function that takes as its argument the height of a pyramid of cannonballs and returns the number of cannonballs it contains.
Computers and Technology
1 answer:
Inga [223]3 years ago
3 0

Answer:

The function in C is as follows:

#include <stdio.h>

int C_ball(int height){

if(height == 1) {

       return 1;}

   return (height * height) + C_ball(height - 1);}      

int main(){

   int n;

   printf("Height: ");

   scanf("%d",&n);

   printf("Balls: %d",C_ball(n));

   return 0;

}

Explanation:

The function begins here

#include <stdio.h>

This defines the function

int C_ball(int height){

If height is 1, return 1

<em>if(height == 1) { </em>

<em>        return 1;}</em>  

This calls the function recursively

   return (height * height) + C_ball(height - 1);}

The main begins here

int main(){

This declares the height as integer

   int n;

This prompts the user for the height

<em>    printf("Height: "); </em>

<em>    scanf("%d",&n);</em>

This calls the function

   printf("Balls: %d",C_ball(n));

   return 0;

}

You might be interested in
A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network techni
Ostrovityanka [42]

Answer:

The technician should delete the startup configuration and the "vlan.dat" file residing in the flash memory of the newly added switch and lastly, he should reboot the switch.

Explanation:

In this scenario, a Cisco Catalyst switch has been added to support the use of multiple virtual local area networks (VLANs) as part of an enterprise network. The network technician finds it necessary to clear all virtual local area network (VLAN) information from the switch in order to incorporate a new network design. To accomplish this task successfully, the technician should delete the startup configuration and the "vlan.dat" file residing in the flash memory of the newly added switch and lastly, he should reboot the switch. The VLAN informations are stored in a file with the name "vlan.dat" residing in the flash memory of the switch.

However, in order to delete the startup configuration he would be required to login as an administrator, so as to have all privileges.

<em>Also, the essence of deleting the startup configuration and the "vlan.dat" is to avoid any conflict in the network. </em>

8 0
4 years ago
Skinner designed a soundproof apparatus, often equipped with a lever or bar, with which he conducted his experiments in operant
Jlenok [28]

Answer: Skinner box

Explanation: Skinner box is referred as the environment to conduct an experiment to observe the natural behavior of the element in a chamber. The Skinner box is also known as operant conditioning chamber. It is most commonly used for the experiments to be conducted with the animals in the operant conditioning chamber for the research purpose.

It is also soundproof tool and also refereed as the lever box as it contains lever .Thus the answer is Skinner box.

5 0
3 years ago
What facilitates the automation and management of business processes and controls the movement of work through the business proc
zhenek [66]

Answer:

D. Workflow management systems

Explanation:

Workflow management systems can be defined as a strategic software application or program designed to avail companies the infrastructure to setup, define, create and manage the performance or execution of series of sequential tasks, as well as respond to workflow participants.

Some of the international bodies that establish standards used in workflow management are;

1. World Wide Web Consortium.

2. Workflow Management Coalition.

3. Organization for the Advancement of Structured Information Standards (OASIS).

Workflow management systems facilitates the automation and management of business processes and controls the movement of work through the business process.

<em>The following are various types of workflow management systems used around the world; YAWL, Windows Workflow Foundation, Apache ODE, Collective Knowledge, Workflow Gen, PRPC, Salesforce.com, jBPM, Bonita BPM etc.</em>

3 0
3 years ago
What are the advantages of using the internet as theinfrastructure for electronic commerce and electronicbusiness?
Mrac [35]

Answer and Explanation:

E-commerce and e-business is a major business of the present time using the internet. It is basically defined as the online selling of goods or making any business online. Internet is the basic requirement for the e-commerce or e-business as

  • it helps in providing the internet connectivity so that the e-business can be displayed online and users can buy goods or interact with seller regarding the business.
  • Due to internet service users get to know about the online business and thus the business attains economic growth and benefit.

6 0
4 years ago
What is virtual reality?
Burka [1]
The computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way by a person using special electronic equipment, such as a helmet with a screen inside or gloves fitted with sensors.
4 0
4 years ago
Other questions:
  • Which change signaled a musical progression toward rock and roll?
    14·1 answer
  • All of the following except one are issues that should be covered in an AUP. Which one is the exception?
    5·1 answer
  • Constraints are a. quantities to be minimized in a linear programming model. b. quantities to be maximized in a linear programmi
    5·1 answer
  • . What is automated testing?
    10·1 answer
  • Tree diagrams are useful for
    12·1 answer
  • Que es un programa de ordenador?
    10·1 answer
  • Assume that passwords are selected from four-character combinations of 26 alphabeticcharacters. Assume that an adversary is able
    11·1 answer
  • (1) Prompt the user to input an integer between 32 and 126, a float, a character, and a string, storing each into separate varia
    13·1 answer
  • Which one did I buy the iPhone 13 or the Samsung S22 Ultra?
    14·2 answers
  • Cyber vulnerabilities to dod systems may include
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!