1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kamila [148]
2 years ago
15

The ideal type of loop to use if you want a user to enter exactly 20 values is a(n) ________ loop.

Computers and Technology
1 answer:
mestny [16]2 years ago
3 0

Answer:

use for loop when you know how much iteration user is going to perform.

if iteration is not confirmed and you want execute your loop atleast once use do while.

You might be interested in
In a digital computer system, the data is transferred between the CPU and the other components
FinnZ [79.3K]

Answer:

The data transmission or information exchange from the CPU to either the computer's peripherals is accomplished via "Computer ports". The further explanation is given below.

Explanation:

To link a display, camera, microphones, or other devices, computer ports have several purposes. The Processor (CPU) also interacts through a bus to peripherals. Several categories of buses you must have got to hear of would be universal servo controller, PCI, or Compulsive-ATA.

  • A peripheral device has always been defined as any auxiliary appliance including a mouse as well as a keyboard, which somehow helps connect to either the PC but instead operates with it.
  • Computer systems were composed of various hardware. This would include the CPU, storage, buses, devices, etc.

So that the above is the right answer to the given scenario.

8 0
3 years ago
What needs to be done before depositing a check using a mobile app?
galben [10]

Answer:

The check needs to be signed in the back by you or whoever is depositing it.

7 0
2 years ago
Read 2 more answers
Anomaly detection systems make use of _______________ that describe the services and resources each authorized user or group nor
zhuklara [117]

Answer:

profiles

Explanation:

<h2><u>Fill in the blanks </u></h2>

Anomaly detection systems make use of <u> profiles</u> that describe the services and resources each authorized user or group normally accesses on the network.

5 0
3 years ago
List 5 object which are considered part of ICT. explain its function.
UNO [17]

Answer:

Here it is

Explanation:

Processing is not considered as the tool of ICT. Explanation: ICT is Information and Communication Technology. This is one of the trending technologies with new concepts.

7 0
3 years ago
Question # 4 Dropdown Finish the code for this function. ​
DaniilM [7]

Answer:

==

Explanation:

I did it on edge 2021

8 0
3 years ago
Read 2 more answers
Other questions:
  • Network layer functionalities can be broadly divided into data plane functionalities and control plane functionalities. What are
    8·2 answers
  • Which of the following describes cloud computing?​
    10·1 answer
  • Experienced students may serve as mentors if they are at least age 21 and have at least 3 years of post-secondary education. In
    5·1 answer
  • Game design colleges anyone know the requirements??
    15·1 answer
  • If a fuse block or holder has tree fuses, it may be termed a...
    7·1 answer
  • Is there any app that understands fake photos<br><br><br>help me i need to know it​
    9·2 answers
  • What is dialog box? ​
    7·1 answer
  • Briefly explain what an array is. As part of your answer make use of a labelled example to show the declaration and components o
    5·1 answer
  • Reesa works for a large real estate company. She is responsible for installing and supporting the company's internet systems, in
    5·1 answer
  • PLEASE ANSWER! I NEED IN 30 MIN.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!