1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAXImum [283]
2 years ago
9

Loops are frequently used to ____; that is, to make sure it is meaningful and useful.

Computers and Technology
1 answer:
vitfil [10]2 years ago
4 0

Loops are frequently used to<u> validate data </u>that is, to make sure it is meaningful and useful.

<h3>What are common blunders made by programmers in coding loops?</h3>

Forgetting to initialize and alter the loop control variable are common mistakes that programmers occasionally make. One set of instructions operates on multiple, separate sets of data. Initialized before joining a while loop.

<h3>What are the three steps that should occur in every loop?</h3>
  • Provide a starting value for the variable that will contain the loop.
  • Test the loop control variable to decide whether the loop body executes.
  • Alter the loop rule variable.

To learn more about Loops , refer

brainly.com/question/19344465

#SPJ4

You might be interested in
The code size of 2-address instruction is________________.? 5 bytes? 7 bytes? 3 bytes? 2 bytes
Finger [1]

Answer:

7 bytes

Explanation:

<u>2 Address Instruction</u>

The 2 address instruction consist 3 components in the format.

One is opcode,other two are addresses of destination and source.

<u>Example-</u>

load b,c | Opcode   destination address,source address

add a,d  | Opcode   destination address,source address

sub c,f    | Opcode   destination address,source address

Opcode consists of 1 bytes whereas destination address and source address consist of 3 bytes each.

(1+3+3) bytes=7 bytes

5 0
3 years ago
Suppose a book author can be identified by an AuthorID and each book can be identified by an ISBN. Besides the identifier, an au
Scrat [10]

Answer:

a) We know that atleast one or more author writes a book.

Symbol to indicate one or more is (B)

So the correct option is B

b) We know that zero to multiple books are written by any author.

Symbol to indicate zero or more is (A)

So the correct option is A

c) The fourth option is correct if we replace by many to many relationship and generate a new entity.

So the relationship betweem author and contract is one to many. So we know that there is atleast one author that represent in symbol d and books has atleast 0 that represent in symbol c.

So Fourth Option is correct d at blue side and c at red side.

d) There are two forirgn keys in table Contract one is from AuthorId and other is ISBN.

So correcct option is C

6 0
3 years ago
A ____ is a software program written to change the behavior of a computer or other device on a network, without the permission o
Tems11 [23]
Security filter app that filters the accessibility of things it deems inappropriate
5 0
3 years ago
61:39 A communication sent through Transmission Control Protocol (TCP) arrives out of order. What allows the data to be put back
kobusy [5.1K]

Answer:

Sequence Numbers

Explanation:

In the transmission control protocol, the sequence number are used to put data back in order.

It is the number pattern that follows sequence. This is the number pattern which interprets data before they are returned by the recipient as an acknowledgement with its numbers.

When a sent data is out of order, the sequence number works towards correcting the sequence before sending its acknowledgement.

7 0
3 years ago
Directions
DanielleElmas [232]

Answer:

is he project for me

Explanation:

3 0
2 years ago
Other questions:
  • The ____ file permission category in unix/linux systems typically entails all permissions and is designated by the letter u.
    7·1 answer
  • Is the ipv6 address 2001:1d5::30a::1 a valid address? why or why not?
    14·1 answer
  • the microsoft excel application is a _____ program. database word-processing spreadsheet desktop-publishing
    8·1 answer
  • After installing the processor, if the system begins the boot process and suddenly turns off before completing the boot, the pro
    14·1 answer
  • Does Buzz or APEX shows all your due assignments on the left of the main home screen?
    11·1 answer
  • What is the effect of persistence of game worlds in social video games?
    14·2 answers
  • Janet received an email from a bank asking for the password for her Internet banking account. She emailed back her password. A f
    12·2 answers
  • Day 1 of seeing if anyone will buy me a psn gift card (if u do u get brainliest and thanks + alot of points
    11·1 answer
  • Select the correct answers
    9·1 answer
  • A site, a domain, or an organizational unit in active directory is referred to as a:____.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!