Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
When is a function said to be recursive? Explain the concept of recursion with examples
0
votes
224
views
asked
Nov 14, 2021
in
Programming Languages & Algorithms
by
(user.guest)
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
1
Answer
+1
vote
answered
Nov 17, 2021
by
(user.guest)
selected
Jan 24
by
(user.guest)
Best answer
A recursive function can be described as any that calls its self during its course of execution. Based on the function and parameters passed to it, it repeats for a number of times. An example of a recursive function is the factorial function.
Your comment on this answer:
Improve the existing answer with your comment.
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
To avoid this verification in future, please
log in
or
register
.
Related questions
0
votes
1
answer
301
views
Explain with examples, the concept of Abstraction in programming
asked
Nov 14, 2021
in
Programming Languages & Algorithms
by
(user.guest)
+1
vote
1
answer
811
views
With the help of examples, explain in details the concept and process of Value Based Software Engineering.
asked
Apr 22
in
Software Engineering
by
anonymous
+1
vote
0
answers
283
views
What could be the reason why the application of the 5 rules of transformation from Entity-Relation to Relation would not produce a collection of relations in 3rd Normal Form. Back your proposal with examples.
asked
Nov 8, 2021
in
Database Management Systems
by
anonymous
+1
vote
0
answers
119
views
Discuss The Exceptio Non Adimpleti Contract Us With Regard To Its Definition, The Principles Of Reciprocity, How Reciprocity Is To Be Determined, As Well As When The Defence Can Be Raised?
asked
Sep 11, 2021
in
Law for Engineers
by
anonymous
0
votes
1
answer
78
views
Which sorting algorithm can be most efficient when the number of records to be sorted is small
asked
May 3
in
Programming Languages & Algorithms
by
(user.guest)
0
votes
1
answer
1.3k
views
What is a computer algorithm? Explain with examples
asked
Nov 10, 2021
in
Programming Languages & Algorithms
by
(user.guest)
+1
vote
1
answer
193
views
How a subclass can be defined in Java using the concept of inheritance?
asked
Sep 1, 2021
in
Programming Languages & Algorithms
by
anonymous
+1
vote
1
answer
4.0k
views
Using examples, explain why configuration management is important when a team of people are developing a software product.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
+4
votes
3
answers
2.1k
views
Write a function called most_consonants(words) that takes a list of strings called words and returns the string in the list with the most consonants (i.e., the most letters that are not vowels).
asked
Oct 1, 2019
in
Programming Languages & Algorithms
by
anonymous
0
votes
0
answers
491
views
Explain why it is important to model the context of a system that is being developed. Give two examples of possible errors that could arise if software engineers do not understand the system context.
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
+2
votes
1
answer
7.5k
views
Explain why it is important to model the context of a system that is being developed. Give two examples of possible errors that could arise if software engineers do not understand the system context.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
816
views
Explain the hash function and write an algorithm for hash technique. Write a program in any high-level language to implement hash function.
asked
Aug 27, 2020
in
Programming Languages & Algorithms
by
anonymous
+1
vote
1
answer
2.1k
views
What is the bit and byte stuffing. Explain this concept with help of neat diagram
asked
Apr 14, 2021
in
Computer Networks
by
anonymous
+2
votes
1
answer
929
views
Explain why it is practically impossible to validate reliability specifications when these are expressed in terms of a very small number of failures over the total lifetime of a system
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
697
views
Explain why it is practically impossible to validate reliability specifications when these are expressed in terms of a very small number of failures over the total lifetime of a system.
asked
Nov 5, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
8.0k
views
When describing a system, explain why you may have to start the design of the system architecture before the requirements specification is complete.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
0
votes
1
answer
1.5k
views
Suppose Bob initiates a TCP connection to Trudy who is pretending to be Alice. During the handshake, Trudy sends Bob Alice’s certificate. In what step of the SSL handshake algorithm will Bob discover that he is not communicating with Alice?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.9k
views
The principle of component independence means that it ought to be possible to replace one component with another that is implemented in a completely different way...
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
2
answers
2.5k
views
Should there be a separate profession of 'software architect’ whose role is to work independently with a customer to design the software system architecture?
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
0
votes
0
answers
469
views
How does Switch learn Mac Address when pc1 wants to communicate with pc2 and pc3? Explain the process with the help of diagram
asked
Nov 22, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
248
views
How does Switch learn Mac Address when pc1 wants to communicate with pc2 and pc3? Explain the process with the help of diagram
asked
Nov 22, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
1.9k
views
It has been said that when IPv6 tunnels through IPv4 routers, IPv6 treats the IPv4 tunnels as link-layer protocols. Do you agree with this statement? Why or why not?
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
232
views
Write a simple JavaScript function to find the product of two numbers
asked
Feb 28
in
Programming Languages & Algorithms
by
(user.guest)
+2
votes
1
answer
1.0k
views
Suggest how you would go about validating a password protection system for an application that you have developed. Explain the function of any tools that you think may be useful.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
2.3k
views
Suggest how you would go about validating a password protection system for an application that you have developed. Explain the function of any tools that you think may be useful.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.4k
views
Explain when it may be cost-effective to use formal specification and verification in the development of safety-critical software systems. Why do you think that critical systems engineers are against the use of formal methods?
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+3
votes
1
answer
1.6k
views
Explain when it may be cost-effective to use formal specification and verification in the development of safety-critical software systems. Why do you think that some critical systems engineers are against the use of formal methods?
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
250
views
What are the sequence of steps that can be followed to systematically develop the axiomatic specifications of a function
asked
Sep 27, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
468
views
Some of the most important pieces of data stored in the RAM are the instructions which basically tells the CPU what to do at a particular time. Explain the concept of Instruction Set in the CPU and how it works.
asked
Oct 26, 2020
in
Computer Architecture
by
anonymous
+1
vote
0
answers
46
views
Explain the concept and principle of Software Process Dynamics. Provide examples
asked
Apr 22
in
Software Engineering
by
anonymous
–1
vote
1
answer
1.4k
views
Duplicate: How might you use a model of a system that already exists? Explain why it is not always necessary for such a system model to be complete and correct. Would the same be true if you were developing a model of a new system?
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
–1
vote
1
answer
1.8k
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
asked
Nov 25, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
507
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 131.107.256.80
asked
Nov 24, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
797
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid:
asked
Nov 24, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
2.9k
views
Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid
asked
Nov 22, 2020
in
Computer Networks
by
anonymous
0
votes
1
answer
57
views
What is the maximum number of binary trees that can be formed with three unlabeled nodes?
asked
May 3
in
Programming Languages & Algorithms
by
(user.guest)
0
votes
1
answer
1.7k
views
What is a private network address? Should a datagram with a private network address ever be present in the larger public Internet? Explain.
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
417
views
How do I make Python3 the default Python when I run Python from terminal. The default Python seems to be v2
asked
Sep 13, 2020
in
Programming Languages & Algorithms
by
anonymous
+1
vote
1
answer
605
views
Explain why change is inevitable in complex systems and examples of software process activities that help predict changes and make the software being developed more resilient to change?
asked
Mar 29
in
Computer Architecture
by
anonymous
–1
vote
1
answer
471
views
Duplicate: When describing a system, explain why you may have to design the system architecture before the requirements specification is complete.
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
3.8k
views
When describing a system, explain why you may have to design the system architecture before the requirements specification is complete.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
446
views
Discuss with appropriate examples the concepts of digital signature and its relevance in business transactions in the 21st century.
asked
Aug 27, 2020
in
Programming Languages & Algorithms
by
anonymous
0
votes
0
answers
498
views
It has been suggested that the control software for a radiation therapy machine, used to treat patients with cancer, should be implemented using N-version programming. Comment on whether or not you think this is a good suggestion.
asked
Dec 4, 2020
in
Software Engineering
by
anonymous
0
votes
0
answers
205
views
For laminar flow in a tube with a constant wall heat flux, it can be shown that the microscopic energy equation can be reduced to the following form where qy is the heat flux in the y direction
asked
Oct 8, 2020
in
Maths & Statistics
by
(user.guest)
+3
votes
1
answer
968
views
It has been suggested that the control software for a radiation therapy machine, used to treat patients with cancer, should be implemented using N-version programming. Comment on whether or not you think this is a good suggestion.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
0
votes
1
answer
2.6k
views
True or false: When a BGP router receives an advertised path from its neighbor, it must add its own identity to the received path and then send that new path on to all of its neighbors. Explain.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.5k
views
We said that a network layer's service model "defines the characteristics of end-to-end transport of packets between sending and receiving hosts."
asked
Oct 1, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
958
views
Thoroughly explain the concept of public keys vis-à-vis private keys in cryptography.
asked
Aug 27, 2020
in
Programming Languages & Algorithms
by
anonymous
+3
votes
1
answer
1.3k
views
Explain with an example why resilience to cyber-attacks is a very important characteristic of system dependability
asked
Feb 1, 2020
in
Software Engineering
by
anonymous
+3
votes
1
answer
624
views
What will be the size of a Jacobian Matrix for a robot manipulator with 8 Joints. What is the significance of the Jacobian Matrix?
asked
Sep 5, 2020
in
Computer Vision & Robotics
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...