Top answers

All subjects
All levels

Question 14)http://ibdocuments.com/IB%20PAST%20PAPERS%20-%20SUBJECT/Group%204%20-%20The%20sciences/Computer_science_SL/2007%20November%20Examination%20Session/English%20Papers/Computer_science_paper_1_SL.pdf

a) With the word access modifier "private" we are declaring that the method will only be accessible within that class (i.e you can not call the method from an external class/file). b) Since the...

Answered by Raul P. Computing tutor
1327 Views

What is a network protocol and why do we need it?

In computer networking, in order for two end devices to communicate in some way, we need rules. These rules are called network protocols. Network protocols are predefined set of rules for effective commun...

Answered by Toma M. Computing tutor
3783 Views

How do you convert a number between decimal and binary?

The number system we use to write numbers is called a positional system. Each digit of the number is a multiplier of the increasing powers of the base. So for binary:
10112 = 1 * 23 <...

Answered by Kacper M. Computing tutor
948 Views

Define how recursion works

Recusion works by creating a method which is defined in terms of itself. This effectively means that the method will make method calls to itself. It makes these calls using increasingly reduced problem si...

Answered by Maximilian K. Computing tutor
1185 Views

The program I've written doesn't do what its supposed to! I don't have any errors, so I don't even know where to start looking for the problem. Where can I begin?

Learning strategies for isolating issues in non-trivial programs is essential for successful programming of any level. Unlike syntax or run-time errors which can often be looked up online or in a book, a ...

Answered by Brendan C. Computing tutor
1102 Views

We're here to help

contact us iconContact usWhatsapp logoMessage us on Whatsapptelephone icon+44 (0) 203 773 6020
Facebook logoInstagram logoLinkedIn logo

© MyTutorWeb Ltd 2013–2024

Terms & Conditions|Privacy Policy