1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zysi [14]
3 years ago
6

How would you create a loop that never ends?

Computers and Technology
1 answer:
34kurt3 years ago
8 0

Answer:

the answer is d use the forever block

Explanation:

I took the test and I got it right but sometimes it is different for others

You might be interested in
A listing of all the methods that are in the execution chain when an exception is thrown is called a(n) ____.
wolverine [178]

A(n) stack trace is a list of all the steps that make up the performance chain when an exception is thrown.

<h3>What exactly is a stack trace?</h3>
  • A stack trace is a report of the active stack frames at a specific point in the execution of a program in computing (also known as a stack backtrace or stack traceback).
  • Memory is frequently dynamically allocated in two locations during program execution: the stack and the heap.
  • As implied by their names, memory is continually allocated on a stack but not on a heap.
  • This stack is known as the program's function call stack in order to distinguish it from the programming construct stack, which is another term for stack.
  • In terms of technology, after a memory block has been assigned

To learn more about stack trace, refer to:

brainly.com/question/15886149

#SPJ4

4 0
2 years ago
UDP provides unreliable data transfer and therefore
vova2212 [387]

Answer: The answer is d.

Explanation:

UDP is a transport protocol (Layer 4 of the OSI model) that has no mechanism to provide a reliable transport between the source process and the destination one, as TCP does.

Anyway, due to this feature, is specially suitable for real-time applications , like video or audio, provided that the user can accept some loss in the stream.

Several real-time protocols, like RTP for instance (used for videoconferencing)  use UDP as transport protocol.

4 0
3 years ago
Which of the following statements is NOT true? a. An infeasible solution violates all constraints. b. A feasible solution satisf
lakkis [162]

Answer:

B. A feasible solution satisfies all constraints.

Explanation:

Linear programming can be explained as a simple technique where we depict complex relationships through linear functions then find the optimum points.

Linear programming is employed for obtaining the foremost optimal solution for a drag with given constraints. In applied mathematics,

real life problem are formulate into a mathematical model. It involves an objective function, linear inequalities with subject to constraints.

Constraints: The constraints are the restrictions or limitations on the decision variables. They usually limit the value of the decision variables.

Hence,

An infeasible solution violates all constraints.

A feasible solution point does not have to lie on the boundary of the feasible region.

An optimal solution satisfies all constraints.

3 0
3 years ago
The part of the computer that provides access to the internet is the?
OLga [1]
Google chrome or the inner webs
8 0
4 years ago
Which describes the open-content method of publishing used by sites such as Wikipedia? A. Subscribers must pay for the ability t
valkas [14]
 The correct answer is B. I used d and got it wrong 
3 0
3 years ago
Read 2 more answers
Other questions:
  • You need to write th java syntax for the expression “7 is greater than or equal to 3” choose the best answer
    8·1 answer
  • How do i know if i got flash installed onchrome
    5·1 answer
  • Which type of view is created from the following SQL statement? CREATE VIEW balancedue AS SELECT customer#, order#, SUM(quantity
    15·1 answer
  • Tablets combine the features of which two types of devices?
    10·2 answers
  • Andrew wants to create a website for his college. Which web-based programming language should he use?
    11·2 answers
  • A small amount of memory stored on the central processor for easy access is called
    6·2 answers
  • Online banking tools allow you to pay bills from your computer. <br> a. True<br> b. False
    5·2 answers
  • As a prospective student, what is the best reason to request an interview with your college application?
    6·1 answer
  • The manager of the Super Supermarket would like to be able to compute the unit price for products sold there. To do this, the pr
    13·1 answer
  • Individuals who break into computer systems with the intention of doing damage are called​ _____________.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!