1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetradugi [14.3K]
2 years ago
15

When one loop appears inside another, the loop that contains the other loop is called the ____ loop. Group of answer choices ind

efinite definite inner outer
Computers and Technology
1 answer:
Sauron [17]2 years ago
5 0

Answer:

outer

Explanation:

When one loop appears inside another, the loop that contains the other loop is called the outer loop.

You might be interested in
Find the area of square whose perimeter is 260.8m​
inessss [21]
4251.04

The perimeter (260.8) over 4 is equal to each side length (65.2)

65.2^2 = 4251.04
5 0
3 years ago
The listing of a directory shows certain files with permissions set to rwsr-xr-x. what does this indicate?
marta [7]
<span>"rws" means that the user has permissions to read, write and setuid. "r" means the user can read the file and "w" means that the user can write to the file. "s" stands for "setuid" (set user id) is a permission bit that allows the users to execute a program with the permissions of its owner. The "s" can also mean "setgid" (set group id) is a bit that allows the user to execute a program with the permissions of the group owner.</span>
5 0
3 years ago
Which programming languages is best for game development? ​
kvasek [131]

Answer:

JavaScript. .

HTML 5.

SQL.

Python. .

Explanation:

hold it helps◕‿◕

3 0
2 years ago
Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
Alla [95]

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

8 0
3 years ago
Which function prompts the user to enter information?
Rzqust [24]

Answer:

input() prompts the user to enter information

6 0
3 years ago
Read 2 more answers
Other questions:
  • This toolbar can be used to change the way the text in your presentation looks. Drawing
    5·2 answers
  • Create a program that reads words.txt (link near top of our home page) in order to: determine the length of the longest word(s)
    14·1 answer
  • Create a Rational number class in Java using the same style as the Complex number class created in class.(The in class example c
    12·1 answer
  • Write a program that prompts the user to enter a string (may contain spaces) and displays its last character. Enter s string: Pr
    13·1 answer
  • One of the disadvantages of an e-marketplace is that it cannot provide a single platform for prices. true or false?
    10·2 answers
  • The World Wide Web is full of unstructured data. Search engines like Google, Bing and Yahoo have been doing a good job of allowi
    6·1 answer
  • Write SQL statements for the following: 1. 2. 3. Change the column Z of a table XYZ to now acceptdefault value 9999 Delete a tab
    8·1 answer
  • What is the value of 8n when n= = 2?​
    13·1 answer
  • I dont uderstand dis my teacher no helping pls help me i need to understand TEch
    10·1 answer
  • When must an Assured Equipment Grounding Conductor Program (AEGCP) be in place?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!