Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar.
PH
var num2 = 32;
var num1 = 12;
var rem=num2 % numi;
while(rem > 0)
{
num2 = num1;
num1 = rem;
rem = num2 % num1;
}
document.write(num1);
The output of the document.write statement at the end of this block is

Answers

Answer 1

Answer:

4

Explanation:

Given

The attached code segment

Required

The output

The first and second lines initialize num2 to 32 and num1 to 12, respectively.

Next, the remainder is calculated on line 3

[tex]rem = 32\%12[/tex]

[tex]rem = 8[/tex]

Then the while loop is repeated as long as rem > 0.

At first, we have:

[tex]num2 = 32[/tex]

[tex]num1 = 12[/tex]

[tex]rem = 8[/tex]

The first iteration gives:

[tex]num2 = 12[/tex]

[tex]num1 = 8[/tex]

[tex]rem = 12\%8 = 4[/tex]

Is 4 > 0? Yes; The loop is executed again.

This gives:

[tex]num2 = 8[/tex]

[tex]num1 = 4[/tex]

[tex]rem = 8\%4=0[/tex]

Is 0 > 0? No; The loop is executed

The last statement prints the last value of num1;

In the last loop, we have:

[tex]num1 = 4[/tex]

Hence, the output is 4

Answer 2

Answer:

Below is correct, the answer is 4.

Explanation:

PLATO

Type The Correct Answer In The Box. Use Numerals Instead Of Words. If Necessary, Use / For The Fraction

Related Questions

Describe two types of storage devices?​

Answers

Answer:

Central Process Unit and Random Access Memory

when was first generation of computer invented? ​

Answers

Introduction: 1946-1959 is the period of first generation computer. J.P.Eckert and J.W. Mauchy invented the first successful electronic computer called ENIAC, ENIAC stands for “Electronic Numeric Integrated And Calculator”.

Write a program that asks the user to enter in a username and then examines that username to make sure it complies with the rules above. Here's a sample running of the program - note that you want to keep prompting the user until they supply you with a valid username:

Answers

user_in = input ("Please enter your username: " )

if user_in in "0123456789":

print ("Username cannot contain numbers")

elif user_in in "?":

print ("Username cannot continue special character")

else:

print (" Welcome to your ghetto, {0}! ".format(user_in))

Argue whether we can infer anything about a candidate’s ability to work in a professional environment based on his or her resume’s formatting.
Compare how you would address a resume with wacky fonts to how you would respond to grammatical errors in a resume.

Answers

Answer:

when dressing feaded back is postive and then list areas of inprovmenr to met the job requirements

Explanation:

Code Example 4-1 int limit = 0; for (int i = 10; i >= limit; i -= 2) { for (int j = i; j <= 1; ++j) { cout << "In inner for loop" << endl; } cout << "In outer for loop" << endl; } (Refer to Code Example 4-1.) How many times does "In inner for loop" print to the console? a. 1 b. 0 c. 2 d. 5 e. 7

Answers

Answer:

"In inner for loop" is printed twice.

Answer: C. 2

Explanation:

Code:

int main()

{

   int limit = 0;

   for  (int i =0; i>=limit; i-=2) {

       for (int j = i; j <= 1; ++j){

           cout << "In inner for loop" << endl;

       }

       cout << "In outer for loop" << endl;

   }

   return 0;

}

Output:

In inner for loop

In inner for loop

In outer for loop

The output "In inner for loop" print twice.

Thus, option (c) is correct.

In the given code example, the inner for loop has a condition j <= 1.

This condition means that the loop will execute as long as j is less than or equal to 1.

However, the initial value of j is i, and the value of i decreases by 2 in each iteration of the outer for loop.

When i = 8, the inner loop has the condition j ≤ 1.

The loop will iterate as long as j is less than or equal to 1.

So the inner loop executes twice: once when j = 8, and then when j = 9. The statement "In inner for loop" prints twice.

Therefore, the output print twice.

Thus, option (c) is correct.

Learn more about Output problem here:

https://brainly.com/question/33184382

#SPJ4

What are computer programs that make it easy to use and benefit from techniques and to faithfully follow the guidelines of the overall development methodology

Answers

Answer:

A Tool

Explanation:

Tools are computer programs that make it simple to use and benefit from techniques while adhering to the overall development methodology's guidelines. The correct option is A).

What are computer programs?

A computer-aided software development case tool is a piece of software that aids in the design and development of information systems. It can be used to document a database structure and provide invaluable assistance in maintaining design consistency.

A computer software application is one that is developed to assist a particular organizational function or process, such as payroll systems, market analysis, and inventory control.

The goal of introducing case tools is to reduce the time and cost of software development, while also improving the quality of the systems created.

Therefore, the correct option is A) Tools.

To learn more about computer programs, refer to the below link:

https://brainly.com/question/9963733

#SPJ2

The question is incomplete. Your most probably complete question is given below:

A) Tools

B) Techniques

C) Data flow

D) Methodologies

DESCRIBE THE GENERAL STRATEGY BEHIND DEALOCK PREVENTION AND GIVE A PRATICAL EXAMPLE

Answers

Answer:

........

Explanation:..........

Which of the following are advantages of a local area network, as opposed to a wide area network? Select 3 options.

provides access to more networks

higher speeds

more secure

lower cost

greater geographic reach

Answers

higher speeds lower cost more secure

Answer:

✅ more secure

✅ lower cost

✅ higher speeds

Explanation:

Edge 2022

Write equivalent predicate statement for Every teacher who is also a painter loves Bob​

Answers

Answer:

Every teacher who is also a painter loves Bob

I have no idea how to answer this question so I’m just gonna

write a C++ program that receives a number as input from the user ,and checks whether it is greater than 8 and less than 10 or not and print the result

Answers

num_in = float (input = ("Please enter a number from 0 to ten: "))

def cmp_num(num_in):

try:

if num_in > 8 and num_in < 10:

print ("{0} is greater than 8 and less than 10".format(num_in) )

elif num_in < 8 and num_in < 10:

print (" {0} is less than 8 and less than 10".format(num_in) )

else:

print ("{0} is out of the restriction".format (num_in))

except ValueError:

print ("Invalid input")

While troubleshooting an Internet connection problem for your network, you restarted the modem and then the router. The router is now communicating with the Internet, which you can confirm by observing the blinking light on the router's WAN indicator. However, now your laptop is not communicating with the router. Order the commands below to fix the problem and confirm connectivity.
a. ping
b. ipconfig /renew
c. nslookup microsoft.com
d. ipconfig /release

Answers

Answer:

d. ipconfig /release

b. ipconfig /renew

a. ping

c. nslookup microsoft.com

Explanation:

A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

Basically, it is an electrical device or node that is designed to connect two (2) different networks (in different locations) together and allows them to communicate.

Generally, routers are configured using a standard routing protocol with an IP address as the default gateway.

Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.

Basically, a DHCP server is designed to automatically assign internet protocol (IP) address to network devices connected to its network using a preconfigured DHCP pool and port number 67.

On a related note, when a computer that is configured with DHCP cannot communicate or obtain an IP address from the DHCP server, the Windows operating system (OS) of the computer automatically assigns an IP address of 169.254.33.16, which typically limits the computer to only communicate within its network.

I. ipconfig /release

II.. ipconfig /renew

III. ping

IV. nslookup microsoft.com

Which Windows installation method requires that you manually rename computers after the installation?​

Answers

Answer:

Command line

Explanation:

After installation of the machine one needs to manually rename the computer. This can be done through the start then settings, then system, and select rename the PC in the right-hand side column.

5. Which events is used to code on any form load
a) Form Text b) Form Code c) Form Load d) Form Data

Answers

Answer:

I think b is correct answer

By Using the following schema, answer the following SQL queries and commands: Product(P_code.P_name, P_price, P_on_hand,vend_code) Vender(vend_code, vend_fname, vend_areacode, vend_phone) 1- find the venders names who sell products in TN-5 area and their names include "dan". 2- find the code, name and vender code of product that has price between 1500S and 2500S and the product that has price between 48005 and 5600S. 3- Find the name, and code of venders who had 5 microwaves that has price less than 3500S. 4- Find the phone numbers of venders who sell Televisions. 5- Delete the records of venders who their first name is 'smith'

Answers

Explanation:

answer me pls i need sol bbbd

What is indirect program memory addressing? Explain the working of the following instructions?

a) JMP AX
b) JMP LIST[DX]
c) JMP NEAR PTR[DI+3]

Answers

Indirect main memory addressing is described as the method in which the variable's address is stored in a mind register and also a command is utilized to point towards the memory registers which hold the register. Instruction is used to direct towards a register that displays the results of the variables. The register, in turn, refers to that variable's address in simplistic words. As just a result, it is indeed considered a passive program, memory address.

The instructions operate as follows:

a)

JMP AX :

The JMP instruction is being used to execute an unconditional jump.AX is indeed the label's name. JMP AX codes are being used to transfer control of the flow program to the AX label.

b)

JMP LIST:

The JMP command can be used to execute an unconditional jump, JMP LIST[DX] is the label's name.  The JMP LIST[DX] program is being used to transfer control of its flow programs to the specified section. It is the segment to which the flow control is transmitted.

c)

JMP NEAR PTR[DI+3]: 

Unconditional jumps could be done with the JMP command as you'll see, the label is JMP NEAR PTR[DI+3]. It's being used to transmit flow control to a particular section, throughout this case [DI+3]. The close keyword indicates that perhaps the code segment would be in the line of code being nearby.

Learn more:

brainly.com/question/20320915

Which one is the result of the ouWhen you move a file to the Recycle Bin, it will be immediately deleted from your computer.

A. True

B. Fals

Answers

Answer:

B => false

Explanation:

it just keep it on recycle bin => not being removed

False

Explaination :

The deleted file will stay in Recycle Bin for a short period of time before it's permanently deleted from your computer

how did hitles rules in nazi germany exemplify totiltarian rule?

Answers

Answer:

hope this helps if not srry

Scenarios are quite common where an IT professional is tasked with modify a file on many computer systems or many files on a single computer or a combination of the two. For example, a large software may need the copyright notice comment to be changed on every source file in the project. Or, a configuration file may need to be modified on every server in a multi-server deployment. Doing this task manually is not a viable way to approach the problem. Instead, a better solution is to use a scriptable environment to perform search and replace functionality on the files in question. Python is an excellent tool for this kind of task.
Description
Samba is a unix/linux file sharing suite of programs designed to provide Windows interoperable file and print sharing services. Much of the configuration for the Samba daemon is provided by the text file smb.conf (renamed to smb.txt for this assignment). After an update was deployed to three dozen linux servers it was discovered that a couple of configured parameters were incorrect. Unfortunately, since there are unique aspects to each server, copying the contents of a single file to each server is not a viable solution. To fix the problem, the IT department must connect to each server, edit the smb.conf file, and restart the smbd daemon. To automate this task, each server will have a Python script copied to it. Then an SSH session will be initiated to each server from which the script will be executed. Your task is to write the Python script.
The invocation of the script must be as follows:
python modify.py fileSpec "from" "to"
where,
modify.py is the name of your script
fileSpec is the name of the file to be modified (smb.txt)
"from" is the text to be searched for (be sure to enclose any white space in quotes.
"to" is the text the searched text is to be replaced with.
Testing the script is your responsibility. However a good test case is:
python modify.py smb.txt "password sync = yes" "password sync = no"

Answers

Answer:

Explanation:/

The example Python script that can be used to automate the modification of the smb.conf file on multiple Linux servers is shown below

What is the code?

python

import subprocess

import sys

def modify_smb_conf(file_spec, search_text, replace_text):

   try:

       # Open the file for reading

       with open(file_spec, 'r') as file:

           # Read the contents of the file

           file_contents = file.read()

       # Perform the search and replace operation

       modified_contents = file_contents.replace(search_text, replace_text)

       # Open the file for writing

       with open(file_spec, 'w') as file:

           # Write the modified contents back to the file

           file.write(modified_contents)

       # Print a success message

       print(f"Modification successful: Replaced '{search_text}' with '{replace_text}' in {file_spec}")

   except IOError as e:

       # Print an error message if there was an issue with file operations

       print(f"Error: {e}")

def main():

   # Check if the correct number of command line arguments are provided

   if len(sys.argv) != 4:

       print("Usage: python modify.py fileSpec \"from\" \"to\"")

       return

   # Extract the command line arguments

   file_spec = sys.argv[1]

   search_text = sys.argv[2]

   replace_text = sys.argv[3]

   # Call the function to modify the smb.conf file

   modify_smb_conf(file_spec, search_text, replace_text)

if __name__ == '__main__':

   main()

Read more about  code here:

https://brainly.com/question/29330362

#SPJ2

The Lisp function LENGTH counts the number of elements in the top level of a list. Write a function ALL-LENGTH of one argument that counts the number of atoms that occur in a list at all levels. Thus, the following lists will have the following ALL-LENGTHs.
(A B C) => 3
((A (B C) D (E F)) => 6
(NIL NIL (NIL NIL) NIL ) => 5

Answers

Answer:

bc

Explanation:

Which of the given assertion methods will return true for the code given below? Student student1 = new Student(); Student student2 = new Student(); Student student3 = student1;
The Student class is as follows.
public class Student{
private String name;
}
a. assertEquals(student1, student2);
b. assertEquals(student1, student3);
c. assertSame(student 1, student3);
d. assertSame(student1, student2);

Answers

Answer:

The true statements are :

A. assertEquals(student1,student2)  

C. assertSame(student1,student3)

Explanation:

AssertEquals() asserts that the objects are equal, but assertSame() asserts that the passed two objects refer to the same object or not, if found same they return true, else return false.

Methods are collections of named code segments that are executed when evoked

The assertion method that will return true for the given code is: assertEquals(student1,student2)  

The code segment is given as:

Student student1 = new Student();

Student student2 = new Student();

Student student3 = student1;

In Java, the assertEquals() method returns true if two objects have equal values.

Assume student1 and student2 have equal values, the statement assertEquals(student1,student2) will return true

Read more about java methods at:

https://brainly.com/question/15969952

mk chưa hiểu nên các bạn giúp mk vs

Answers

Answer:

my tab and state it all over my name to

10. Which property is used to show the form in maximize state
a) Selection State b) Window State c) Mode d) Opening State

Answers

Answer:

windows state

Explanation:

the answer is windows state.

What’s cloud-based LinkedIn automation?

Answers

Answer:

Cloud based LinkedIn automation includes tools and software that run through the cloud-system and are not detectable by LinkedIn. Cloud based LinkedIn automation tools are becoming the favorite among B2B marketers and sales professionals as they are giving the desired outcomes without any effort.

Which is not a MARKETING impact of technology?

Social
Cultural
Economic
Environmental

Answers

Answer:

the answer is environmental

The slope and intercept pair you found in Question 1.15 should be very similar to the values that you found in Question 1.7. Why were we able to minimize RMSE to find the same slope and intercept from the previous formulas? Write your answer here, replacing this text.

Answers

I don’t get the question

what is the main difference between a computer program and computer software​

Answers

Answer:

Think of computer software sort of as DNA, because DNA is the human body's computer software. And a computer program is like an activity your body does.

Explanation:

Sorry if this didn't help.

hi, please help me, please help me.​

Answers

my day has been good
hope this helps

Differentiate between email and NIPOST System

Answers

Answer: NIPOST System is sending mail physical like photos and letters and many items

Email is electronic  mail sent through the internet but you can send it anywhere

Explanation:

Cryptarithmetic algorithm

Answers

Answer:

CryptArithmetic or verbal arithmetic is a class of mathematical puzzles in which the digits are replaced by letters of the alphabet or other symbols. Usually it is required that each letter would be replaced by a unique digit. Each letter having different value from the other letters.

Explanation:

Cryptarithm now denotes mathematical problems usually calling for addition, subtraction, multiplication, or division and replacement of the digits by letters of the alphabet or some other symbols. ... Since D × B has only one digit, B must be 3 or less. The only two possibilities are 0 and 2.

The analog computer deals directly with

Answers

continuously variable aspects of physical phenomena such as a electrical, mechanical etc.

The analog computer deals directly with measured values of continuous physical magnitude.

What is an Analog computer?

An analog computer may be defined as a type of computer that is significantly used to process analog data. These computers store data as a continuum of physical quantities and perform calculations using measurements.

It is completely different from digital computers, which use symbolic numbers to represent results. are great for situations that require data to be measured directly without conversion to numbers or codes. Analog computers, although readily available and used in scientific and industrial applications such as control systems and aircraft, have largely been superseded by digital computers due to the many complications involved.

Therefore, the analog computer deals directly with measured values of continuous physical magnitude.

To learn more about Analog computers, refer to the link:

https://brainly.com/question/18943642

#SPJ2

Your question seems incomplete. The most probable complete question is as follows:

The analog computer deals directly with:

number or codes.measured values of continuous physical magnitude.signals in the form of 0 or 1.signals in discrete values from 0 to 9
Other Questions
Why were the federalist and anti federalist important? As well as the Bill of rights? How many digit numbers with all ranging from to have at least of their digits equal. How many have exactly equal digits Identity each italicized subordinate clause as a noun clause, an adjective clause, or an adverb clause.I remember what you told me about poison ivy. The vertex of this parabola is at (-1,-3). Which of the following could be itsequation?(-1, -3)O A. X=-2(y+3)2-1B. x=-2(y - 3)2 - 1C. X=-2(y + 1)2-3D. X = -2(y - 1)2-3 Type your answer and then click or tap Done.Now look at the combined sentence. Which portion of the combined sentence is the compound subject?Sir Edmund and his son, Cecil, were explorers. he means by which a message is transmitted or the path the communication follows is called the __________. Choose... __________ is the response to a message. Choose... The __________ is the content a communicator intends to share. Choose... The parties who share messages with each other are called __________. Choose... __________ is defined as any obstacle that prevents a message from being communicated. if f(x)=xsquare find f inverse x what happens at the end of translation? p(x),f(x),g(x) are parabolas with positive coefficient, each pair of parabolas got common rational root, how to proof that p(x)+f(x)+g(x) have a rational root? the molar mass of oxygen(O2) is 32g. what is the mass of 1.05*10^25 molecules of O2 Help, please answer this for me What kind of material is found in the C horizon of a soil profile?hardpanmineral and organic matterclay particlespartially weathered parent material Express the radical using the imaginary unit, i.Express your answer in simplified form.sqrt(-35) if you roll a single die and get 4 fives in a row what is the probability that you would get a 5 on the next roll Your grandma recently moved to Hawaii (Hawaiian Standard Time Zone). You always call her at 8:00pm on her birthday (November 6th). You are at home in Southern California. What time do you need to call her to reach her at 8:00pm Hawaiian Time If you have car sickness, but only when you look at a book or screen while its moving, is there an exact terminology for it?and sorry if i chose the wrong subject for this, im new to asking questions. Badluckville had been expecting a $50 million investment for a new golf resort, but the contract was cancelled.Badluckville's mayor estimates that this will cost the city $300 million in total economic activity. What is the mayor'sestimate of the multiplier and marginal propensity to consume? What are the basic elements of selection of proffesion?describe any two What is the bit pattern (raw binary) of the single precision representation of the decimal number 0.125 following IEEE 754 standard Determine the theoretical yield and the percent yield if 21.8 g of K2CO3 is produced from reacting 27.9 g KO2 with 57.0 g CO2. The molar mass of KO2