1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viktor [21]
3 years ago
12

Write a statement that terminates the current loop when the value of the int variables x. and y.are equal

Computers and Technology
1 answer:
lakkis [162]3 years ago
6 0
To <span>rite a statement that terminates the current loop when the value of the int variables x. and y.are equal please check below:
</span>
if (x == y) break; // exit loop 

I hope the answer will help you. Thank you. 

You might be interested in
Whats 12/29 divided by 12/34
Mnenie [13.5K]

Answer:34/29 or 1.172413793

8 0
3 years ago
Read 2 more answers
Differentiate hardware andsoftware interrupts?
Tom [10]

Answer:

-Hardware interrupts are the interrupts that occur due to the external devices.

-Software interrupt arises due to the executing program.

Explanation:

  • Hardware Interrupts are the raised due to external hardware devices whereas the software interrupts are raised by the executing instruction.
  • Asynchronized events occur in the hardware interrupts whereas software interrupt face the synchronized events.
  • There is increase in the program counter in software interrupt but no increment in the program counter for the hardware interrupt.

8 0
3 years ago
)What is proceduralabstraction, and why is it important inComputer Science
STatiana [176]

Answer:

Procedural abstraction is a method in which all sub tasks of a whole functionality must be created separately as method and each method/ procedure must be performing a distinct functionality. For example if we want to write a program to calculate and display result of students in class and create separate methods to get students record, to calculate grades to display results is a procedural abstraction approach. Here not only the methods created have distinctive function the administrative can vary the level of abstraction as well.

It is important in computer science for the following ways:

1) Increase the level of code readiness as all separate functionality tasks will have a separate methods.

2) Prevents unauthorized of data.

6 0
3 years ago
Why is it a risk of using you mobile cell phone or external WLAN as a wi-fi connection point?
MAXImum [283]

The risk of using you mobile cell phone or external WLAN as a wi-fi connection point is that  it is one that do lacks the right security measures to be able to keep the network safe from intrusion.

<h3>What is one of the Risks of linking to a public Wi-Fi network?</h3>

The Risks of a Public Wi-fi is that a free Wi-Fi security is one that helps a any hacker to be able to put or position themselves between the user and the connection point.

Note that in this case, the user instead of they talking directly with the hotspot, they are known to be sending their information to the hacker, who is said to often relays it on.

Hence, The risk of using you mobile cell phone or external WLAN as a wi-fi connection point is that  it is one that do lacks the right security measures to be able to keep the network safe from intrusion.

Learn more about WLAN from

brainly.com/question/26956118

#SPJ1

3 0
2 years ago
Advantage of internet to millennials​
Nutka1998 [239]
Benefits of Millennials – Networking Millennials, being constantly active on various social media platforms, are more connected and exposed to greater networks. Give them 10 minutes and they will be able to reconnect with the majority of their primary, secondary and tertiary school connections along with previous colleagues
8 0
3 years ago
Read 2 more answers
Other questions:
  • ?trophic levelNYIGVU.;/IO9YK7,'0;
    12·1 answer
  • What directory under / contains the log files and spools for a linux system?â?
    13·1 answer
  • A network technician has created a network consisting of an external internet connection, a DMZ,
    14·1 answer
  • Jenny wants to look at row 345 and compare it to row 17. What can she do if she wanted to easily adjust to see both at once?
    11·1 answer
  • Within a major students can choose to study a specific area within major. For example a journalism student may study military jo
    13·1 answer
  • The physical parts or components of a computer system is called
    12·2 answers
  • im past 1000 pts and it still hasnt up my rank from VIRTUOSO to EXPERT can someone explain and yes i have brainly plus
    7·2 answers
  • What is the maximum number of characters you can have in a file name​
    8·1 answer
  • Hand tools are generally classified based on :​
    5·1 answer
  • Q1. Information systems that monitor the elementary activities and transactions of the organizations are: I a. Management-level
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!