what happens to the fractional part when a division is performed on two integer variables? group of answer choices two integers cannot be used in division; at least one of the operands should be a floating-point number. the fractional part is discarded. the fractional part is rounded off to the nearest integer value. instead of using an integer division, you should use the modulus operator to perform floating-point division.

Answers

Answer 1

When dividing two integer variables, the fractional portion is ignored by integer division.

Integer variables are what?

Variables with an integer value requirement are known as integer variables (0, 1, 2,). Binary variables are a particular class of integer variables. The only possible values for binary variables are 0 and 1. They are numerical variables that can only have a value of one.

What kind of variable has an integer format?

In a single declaration, you can declare a field as an integers and give it a value. For instance: age is 10 int; This example would declare the age variable as such an integer and give it the number of 10.

To know more about integer variable visit:

https://brainly.com/question/27855584

#SPJ4


Related Questions

Match each explanation with the correct term.

1-multiprocessing
2-subtasks
3-multiprogramming

•Each task allocated a set amount of time in which to be executed.

•Tasks are executed through different processors and shared memory.

•Components of instructions are broken down to enable concurrent processing. Tasks are executed through different processors and shared memory.

Answers

The ability for many processes to share processors (CPUs) and other system resources is known as multitasking. One task is run at a time by each CPU (core). However, multitasking enables each processor to swap between active tasks without having to wait for each one to complete (preemption).

What multiprogramming task allocated set amount of time?

Multitasking in computers is the simultaneous performance of several tasks (sometimes referred to as processes) for a predetermined amount of time.

Therefore, Instead of waiting for an existing job to finish, new ones can begin and interrupt it before it is complete.

Learn more about multiprogramming here:

https://brainly.com/question/13441089

#SPJ1

what kind of software would you use to view and troubleshoot protocol specific problems such as tcp retries

Answers

The most common software used to view and troubleshoot protocol specific problems such as TCP retries is a protocol analyzer. Popular examples are Wireshark, tcpdump, and Microsoft Network Monitor.

The Benefits of Using a Protocol Analyzer for Troubleshooting Protocol Specific Issues

Protocols such as TCP are fundamental for the successful communication and interaction of computers with each other over the internet. As such, any problems or issues with these protocols can have serious consequences for the functionality of networks and systems. To identify, diagnose and troubleshoot these issues, protocol analyzers are essential tools. This essay will discuss the benefits of using a protocol analyzer for troubleshooting protocol specific issues.

A protocol analyzer is a type of software which can be used to view, analyze and monitor the traffic generated by protocols such as TCP. It can be used to detect issues such as retransmissions, packet drops, or incorrect packet sizes. As such, it serves as an invaluable tool for network and system administrators who need to diagnose and troubleshoot protocol specific issues.

Learn more about TCP protocol:

https://brainly.com/question/14280351

#SPJ4

Rabia is new to game design in Scratch, and she wants to know how to create levels in her game. Which of the following phrases should she search for on the internet?

A.
how to add sprites to your game

B.
how to add different backdrops to your game

C.
how to animate a sprite

D.
how to set up a score variable

Answers

Since Rabia is new to game design in Scratch, and she wants to know how to create levels in her game, the phrase which she should search for on the internet is: B. how to add different backdrops to your game.

What is a search engine?

In Computer technology, a search engine simply refers to a software program (application) that is designed and developed to search the world wide web (WWW) or various websites on the internet, and identify items that correspond to the keywords (string of characters) and phrases, which must be specified by an end user.

In this scenario, the phrase "how to add different backdrops to your game" should be entered into a search engine over the internet in order to see a list of results on how to create levels in Scratch game.

Read more on search engine here: brainly.com/question/27965856

#SPJ1

Answer:

your answer would be how to add different backdrops to your game

Explanation:

Create a program that prompts the user for how old they are turning, and then, using a loop, outputs a virtual cookie for every year old they are.

Answers

Answer:

age = int(input('How old are you turning? '))

for i in range(age):

   print('(::)')

According to the cloud computing trends for 2020 video case, what term is used to describe a distributed computing model where information is processed closer to its source?.

Answers

Answer:      Public cloud providers have begun to distribute their services to different geographical locations, becoming known as the distributed cloud. In this way, the cloud is broken up into multiple smaller datacenters in different locations rather than just one large datacenter.

Explanation:

using a chained hash table with an array size of 17. what is the maximum number of entries that can be added to the table.

Answers

There is no maximum upper limit of entries that can be added to the tables in an array.

What are an example and an array?

An array is a collection of comparable types of data. For instance, we can create an array of the string type that can hold 100 names if we need to record the names of 100 different persons. an array of strings = new String[100]; Here, the aforementioned array is limited to 100 names.

How do arrays function?

Elements of the same data type are found in adjacent and close-by memory areas in a linear data structure known as an array. Arrays operate using an index system with values ranging from 0 to (n-1), where n is the array's size.

To know more about array visit:

https://brainly.com/question/19570024

#SPJ4

How would you describe the game Space Invaders?

A.
a modern-day shooter-style game created in the year 2000

B.
a classic type of shooter game created in the 1970s

C.
an educational game about space

D.
a modern, puzzle-style game

Answers

One can describe the game Space Invaders as: "a classic type of shooter game created in the 1970s" (Option B).

What is space invaders?

Space Invaders is a stationary shooter in which the player moves a laser gun across the bottom of the screen and fires at aliens above. The aliens begin in five rows of eleven, moving left and right as a group, changing lower whenever they hit a screen boundary.

Prior to Space Invaders, music and sound effects were essentially afterthoughts in game design, serving as supplemental features that had little bearing on gameplay. Space Invaders was the first game to have ongoing music that played as the player moved.

Given the intentionality of the low-pixel feel of the above-named, game, one can rightly say that is is a classic type of shooter game.

Learn more about Space Invaders:
https://brainly.com/question/10941943
#SPJ1

she is developing access policies based on personnel security principles. as part of this effort, she is devising a method of taking high-security tasks and splitting them among several different employees so that no one person is responsible for knowing and performing the entire task. what practice is she developing?

Answers

The right response is a direct assault. An immediate attack is a type of chance where a threat is actively pursued and compromised by a group of people.

What is assault?In general, an assault is defined as an intentional act that causes another person to reasonably fear harmful or offensive contact will occur soon. No actual harm must be done to the victim, but the actor must have intended to make an offensive or harmful contact with them, and the victim must have been made aware of this intention immediately.In the context of an assault, "intention" denotes that the action was not accidental; the motive, however, is irrelevant.It doesn't matter if the tortfeasor just wanted to scare the victim or if they were making a joke about it.It is sufficient for the tortfeasor to have intended the actual contact without regard to whether it was harmful or offensive.

To learn more about intention refer https://brainly.com/question/29613124

#SPJ4

Answer the following question in 3-4 complete sentences. Define the following terms: - registration - press - keyblock.

Answers

Answer: the action or process of registering or of being registered:                    To exert steady weight or force against: an indentation where the rock pressed the ground                              

In financial cryptography and PCI standards, a Key Block is an encrypted key stored with its metadata in a cryptographically secure way. That means that the key’s usage information and other parameters can’t be altered by an attacker by tampering with the encrypted key.

Explanation:

if you need to display lots of text in a worksheet, you can consider using a text box. how will you insert a textbox?

Answers

Select "Text Box" under the "Text" section of the Insert tab. To draw a text box in the worksheet that is the desired size, click and drag. To add text, simply click inside the box and enter or paste your text.

In Excel, what is the name of the text box?

This cell. There are rows and columns in an Excel worksheet. Cells are the little boxes that are formed where these columns and rows cross. The cell with a black border is the active cell, or the cell that can be affected.

The text box function is what.

You can add a text box as an object to your document, allowing you to enter and insert text wherever in your file. Text boxes can be beneficial for moving material about in your document as well as for calling attention to certain text.

To know more about Text box in Excel visit;

https://brainly.com/question/14831906

#SPJ4

In CANTRAC, what functionality portion of CeTARS is where course data is initially input and updated, this data is automatically updated in CANTRAC?

Answers

Answer:

Discoverer

Explanation:

g 1 - explain how a vpn can prevent: a) a man-in-the-middle-attack. b) passive eavesdropping 2- explain how to reconcile the integrity guarantees of ipsec with the fact that certain fields in the ip header are mutable.

Answers

This guarantees that packets are coming from a reliable source and not an intruder Encryption. Each packet's IP header and payload are both encrypted via IPsec.

What is IP Security?

A system called IP Security, or IPsec, allows for the safe transmission of data over open networks. to create circuits utilising IPsec tunnelling, where all data transported between the two endpoints is encrypted, to secure network data. With the following qualities, IPsec can secure our traffic. Confidentiality is ensured by encrypting our data so that only the sender and recipient may access it. Establishing secure connections between devices is  a VPN operates. The IPsec or SSL/TLS encryption protocols are frequently used in VPNs. Encryption keys are created by each device connected to the VPN, and all data transferred across the VPN is encoded and decoded using these keys.

To learn more about network data from given link

brainly.com/question/9421222

#SPJ4

2.Avoid stepping on__________________________or any other computer cable.

(1 Point)

a electrical wires

b computer cord

c internet cable

d thernet cable
3.Do not touch, connect or disconnect any ________________without your _________________ permission.

(1 Point)

a. computer buttons, mother's

b. plugs, principal's

c cables, teacher's

d controller cable, mother's

Answers

Answer:

2. A

3. C

I think. They can be multiple answers so it really depends on the subject matter.

Explanation:

What is output by the following code?
c = 1
sum = 0
while (c < 10):
c = c + 2
sum = sum + c
print (sum)

Answers

Answer:

if the code is like this, theres an indent on the print(sum)

c = 1

sum = 0

while (c < 10):

   c = c + 2

   sum = sum + c

   print (sum)

the output would be:

3

8

15

24

35

or

if the code look like this, it has no indent on print(sum)

c = 1

sum = 0

while (c < 10):

   c = c + 2

   sum = sum + c

print (sum)

the output would be:

35

Select the instance when you would use a while loop instead of a for loop.

Printing out a range with a specified starting and end value
Repeating an action as long as a condition is true
Adding up the values in a specified range
Locating a value in a specified range

Answers

Answer: Repeating an action as long as a condition is true.

Explanation:

which cytoskeletal element could be described as solid, thinner structures that are often organized into a branching network?

Answers

the cytoskeletal element could be described as solid, thinner structures that are often organized into a branching network is microfilaments

What is microfilaments?As they are made up of two entangled strands of the globular protein known as actin, microfilaments are also known as actin filaments. They are the tiniest filaments of the cytoskeleton and polymers of the protein actin. They are essential for muscle contraction, cell division, and cellular mobility.With a diameter ranging from 5 to 8 nanometers, microfilaments are the thinnest cytoskeleton filaments seen in the cytoplasm of eukaryotic cells. These filaments' polymers are robust and flexible, resisting buckling and crushing while providing support for the cell.Microfilaments are adaptable parts that are crucial to cytokinesis and the structure of a cell. The flexible filament layout of the framework makes it possible for it to aid in cell migration.

To learn more about microfilament refer to:

https://brainly.com/question/1286389

#SPJ4

Which behavior listed below has a negative impact on productivity

Answers

Answer:

Becoming distracted.

Explanation:

Becoming distracted is a bad habit that can negatively affect productivity. Nevertheless, distractions can come in many forms.

what is a computer? ​

Answers

Answer:

A computer is an electronic machine designed to accept data as input , process the data, and give out required information/ result as output

EXPLANATION:

A computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result

based on a program, software, or sequence of instructions on how the data is to be processed.

i hope this helped

you want to be able to identify the services running on a set of servers on your network. which tool would best give you the information you need? answer port scanner protocol analyzer network mapper vulnerability scanner

Answers

Services running on a set of servers on your network. the tool would best give you the information you need  vulnerability scanner

What is mean by  vulnerability scanner?A vulnerability scanner is a piece of software created to examine networks, applications, and machines for vulnerabilities. These scanners are employed to identify a system's vulnerabilities. They are used to identify and find vulnerabilities in network-based assets like firewalls, routers, web servers, application servers, etc. that result from incorrect setups or poor programming. Both authenticated and unauthenticated scans are possible with contemporary vulnerability scanners. Modern scanners are frequently offered as SaaS (Software as a Service); they are delivered online and are shown as web applications. The installed software, open ports, certificates, and other host data that can be queried as part of its workflow can all be customised by the modern vulnerability scanner, as well as vulnerability reports.

To learn more about   vulnerability scanner refer to:

https://brainly.com/question/29534018

#SPJ4

To add a design to your PowerPoint, you should look under the ______ tab.

Design
Home
Insert
All of the above

Answers

To add a design to your PowerPoint you would look under the design tab.

which of the following classifications of method behavior produces acceptable side effects? group of answer choices any method that changes another object. any method that changes an explicit parameter. mutator methods that do not change explicit parameters. accessor methods that do not change explicit parameters.

Answers

The following classifications of method behaviour produces acceptable side effects is Mutator methods that do not change explicit parameters.

How do I use Java's mutator methods?

Accessible methods for mutators must be declared. Although, there is no return type for Mutator methods. However, depending on the information type of the residential variable, they may accept a parameter. Then, it will use the keyword this to acquire the private variable and set its value to the parameter's value.

What names should mutator methods have?

Now let us start with the names that mutators are given. The method has to return void and be public. In addition, the keyword set should start the method name in lowercase. the class variable name, starting with a capital letter.

To know more about  Mutator methods visit:

https://brainly.com/question/29852600

#SPJ4

a system administrator opens a phishing email while using his privileged credentials is considered an insider threat?

Answers

It is true that an insider threat exists when a system administrator opens a phishing email while using his privileged credentials.

What is system administrator?A system administrator (sysadmin) is an information technology professional who supports a multiuser computing environment and ensures continuous, optimal performance of IT services and support systems.Sysadmins are responsible for ensuring the uptime of their companies' computers, servers and internet -- basically "keeping the lights on" to limit work disruptions. This includes system maintenance and configuration, such as installing and troubleshooting hardware and software and assessing new technologies for their companies.Nevertheless, system administrator job responsibilities vary greatly among employers. In larger organizations, the title may be used to describe any administrator who is responsible for a specialized IT system, such as the one that supports servers.

To learn more about servers refer to:

https://brainly.com/question/24137718

#SPJ4

what career cluster allows you to act direct or produce

Answers

Answer:

finance analyst, treasurer, economist, bank worker, debt counselor or insurance professional.

Explanation:

Question 2 of 25
What is the best definition of a programming language?
A. The internal language a computer uses to communicate with
other computers and devices
OB. A language that instructs a computer how to carry out functions
OC. A complex thought process that breaks down difficult problems to
find their solutions
OD. The language that developers use to communicate with one
another about software design
SUBMIT

Answers

Answer:

A language that instructs a computer how to carry out functions

Explanation:

The definition of computer programming is the process of writing code to facilitate specific actions in a computer, application or software program, and instructs them on how to perform.

This is a longer answer to the question just without "language" in it.

Answer:

B. A language that instructs a computer how to carry out functions

Explanation:

A computer language designed to provide standardized commands is known as a programming language. These instructions can be translated into a machine-readable code.

Instant Search can NOT be used to search through archived messages.
Please select the best answer from the choices provided
True or false

Answers

Answer: False

Explanation:

Instant Search can be used to search through archived messages!

write a Visual Basic program that asks the user to enter a number and then displays the number than is ten times larger than the number entered.​

Answers

Answer:

Module Module1

   Sub Main()

       Dim num As Integer

       Console.WriteLine("Enter a number: ")

       num = Console.ReadLine()

       Console.WriteLine("The number you entered is: " & num)

       Console.WriteLine("The number ten times larger than the number you entered is: " & num * 10)

       Console.ReadLine()

   End Sub

End Module

assuming a packet loss is detected after the 26th round by a receipt of a triple duplicate ack, the value of the congestion window size will be

Answers

The threshold will be set to half the current value of the congestion window (8) when the loss occurred and congestion window will be set to the new threshold value + 3 MSS. Thus the new values of the threshold and window will be 4 and 7 respectively.

What is Congestion window?

The congestion window (CWND) is one of the factors in TCP that determines the maximum number of bytes that can be sent out at any given time. The sender maintains the congestion window, which prevents a link between the sender and the receiver from becoming overloaded with traffic. This is not to be confused with the sender's sliding window, which exists to keep the receiver from becoming overloaded. The congestion window is calculated by estimating the amount of congestion on the link.

When a connection is established, the congestion window, which is kept independently by each host, is set to a small multiple of the maximum segment size (MSS) allowed on that connection.

To know more about TCP, visit: https://brainly.com/question/14280351

#SPJ4

you are the network administrator for stellacon corporation. users in the sales department have been complaining that the sales application is slow to load. using performance monitor, you create a baseline report for one of the computers, monitoring memory, the processor, the disk subsystem, and the network subsystem. you notice that the disk subsystem has a high load of activity. what other subsystem should you monitor before you can know for sure whether you have a disk subsystem bottleneck?

Answers

Memory. Check the memory counters, please. Insufficient memory might result in excessive paging, which might be viewed as a disk subsystem bottleneck.

What is disk bottleneck?In computing, data storage bottlenecks occur when the resources or storage architecture are insufficient to enable the efficient handling of the available data. To remove storage bottlenecks, the appropriate storage tools and IT know-how are needed.However, because of the imbalanced strain the application environment places on the storage systems, it is frequently not a disk capacity issue but a storage I/O bottleneck problem that might arise in a storage environment. The performance of storage systems is influenced by many factors.

To learn more about Memory refer,

https://brainly.com/question/27266144

#SPJ4

Why do games usually have rules?

A.
to make them less fun

B.
to provide structure so that the game objective can be achieved

C.
so that they can be broken

D.
because it’s easier to program rules into a game

Answers

Answer:

B

Explanation:

Part B

what is the name of the type that denotes whole numbers? group of answer choices whole int double integer

Answers

Defaulting to a 32-bit signed two's complement integer, the int data type has a range of values between -231 and 231-1.

What does the kind that represents whole numbers go by?

An integer, pronounced "IN-tuh-jer," is a whole number that can be positive, negative, or zero and is not a fraction. Integer examples include -5, 1, 5, 8, 97, and 3,043.

A double data type: what is it?

Double: A double-precision 64-bit IEEE 754 floating point is the double data type. The Java Language Specification's Floating-Point Types, Formats, and Values section contain information about its range of values, which is outside the purview of this discussion. This data type is typically the default option for decimal values.

to know more about whole numbers here:

brainly.com/question/29766862

#SPJ4

Other Questions
Look at picture !!!! Slope= Y-intercept=Equation= Which represents the greatest time frame in which a short term environmental change can occurIn day In minutes Over hundreds of years Over thousands of years Which text structure is used in this passage?Cause/effectcompare/contrastdescriptionsequence adrenal glands produce a variety of hormones influencing sodium retention, glucose metabolism, estrogen production, and sympathetic nervous activity. responses An ordinary regression (or ANOVA) model that treats the response Y as normally distributed is a special case of a GLM, with normal random component and identity link function. True/False David catches 75 camels, tags them, and releases them. A few weeks later, a helicopter pilot takes an aerial photograph of 310 camels, 25 of which are tagged. To the nearest whole number, what is the best estimate for the camel population? question content area the statement of cash flows is not one of the basic financial statements. true false (1 point) how many different ways can a race with 6 runners be completed? (assume there is no tie.) your answer is : 36 if there are five people in a car and 1 person is the driver, how many unique seating arrangements are there Describe Mansa Musas traveling caravan.THE RIGHT ANSWER GET 20 POINTS AND BRAINLIEST In the above diagram, the correct multiplicities designated with the number 1 is which of the following? 0,11,10,*1,**,* Which of the following court cases was significant in the development of multicultural and multilingual education? What kind of file is this? What is it used for? Describe a situation where you might want to createthis type of file. help meeeeeeeeeeeeeeeeeeeeeeeeeee pleaseeeeeeeeeeeeeeeeeeeeee!!!!! HELP Using information from the article and the lesson, as well as your understanding of Japans physical terrain and population patterns, explain why the country has become more reliant on railways rather than roadways. What evidence can you point to in support of your explanation? 1. When an initiative approved by the voters is challenged in the courts, the courtsa. Must follow the will of the voters.b. May overrule the initiative if they find it unconstitutional.c. Refer such measures to the legislature.2. California voters complain that they have little influence in national elections because their primarya. Draws low voter turnout.b. Is shackled by direct democracy.c. Is a top-two primary.d. Traditionally falls in June, so the election is virtually already decided.d. Usually overturn the initiative.3. The passage of Prop. 13 causeda. Nothing to change in the real estate market.b. A shortage of homes for sale--homeowners tended to stay put.4. Which of the following is considered a "user" tax?a. Bank and corporation taxesb. Cigarette taxc. Property taxd. Sales taxc. Many people to want to buy homes that were locked in under Prop. 13.d. An increase in the number of homes on the market. Consider the following scenario to understand the relationship between marginal and average values. Suppose Dmitri is a professional basketball player, and his game log for free throws can be summarized in the following table. Fill in the columns with Raphael's free-throw percentage for each game and his overall free-throw average after each game.GameGame ResultTotalGame Free-Throw PercentageAverage Free-Throw Percentage18/108/10808026/1014/2031/515/2543/518/3058/1026/40On the following graph, use the orange points (square symbol) to plot Raphael's free-throw percentage for each game individually, and use the green points (triangle symbol) to plot his overall average free-throw percentage after each game. Identify the events that brought Hitler into total power answer qauetion plsits in the picture Ahora responde las preguntos que corresponden a esta parte de la seleccin.1. Basndose en el atculo, cul es el razonamiento que pueden hacer los leclores sobre el TitanicA. Hubiera podido estar mejor construido.B. Hubiera debido ser investigado mejor.C. Debera haber demorado ms en hundirse.D. Era ms pesado de lo que se necesitaba.2. Cul oracin describe mejor el escenario del Titanic antes del hundimiento?A. El Titanic zarp el 10 de abril de 1912.B. Durante cuatro das los 2.000 pasajeros cenaron, ballaron y disfrutaron de las comodidades delbarco.C. La embarcacin era impresionante.D. Estaban muy orgullosos de ser los primeros pasajeros en viajar.3. Esta seccin del artculo trata principalmente sobreA. la construccin del Titanic.B. el hundimiento del Titanic.C. los pasajeros del Titanic.D. los constructores del Titanic.4. Qu oracin resume el trabajo ms importante de Jason mientras exploraba el Titanic?A. Jason entr a las habitaciones y cabinas y tom fotografas.B. Los cientficos alcanzaron reas a las cuales era difcil llegar.C. Los cientficos queran fotografas de los principales artculos hundidos con el barco.D. Jason iba a conocer detalles sobre la razn por la que se hundi el barco.