1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Troyanec [42]
3 years ago
9

Which of the following statements expresses why the following code is considered bad form? for (rate = 5; years-- > 0; System

.out.println(balance)) . . . I. unrelated expressions in loop header II. doesn't match expected for loop idiom III. loop iteration is not clear II and III only I and II only I and III only I, II, and III
Computers and Technology
2 answers:
OlgaM077 [116]3 years ago
7 0

Answer:

l and ll only that is the answer

marta [7]3 years ago
5 0

Answer:I , II , and III

Explanation:

You might be interested in
this weekend you areplanning to complete part of your assignment at the library to do this you need to store data on a removable
Archy [21]
A flash drive, it can be put into a USB port and the computer will register it and you should be able to pull up anything you store on it on a another computer or device you are using.

4 0
3 years ago
Choose all of the items that represent functions of an operating system.
Lynna [10]

Answer:

all 5

Explanation:

operating system is the software thay runs other software

brainly.com/question/18465035

6 0
2 years ago
__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a maliciou
True [87]

According to security evaluation, <u>Penetration testing</u> is a level beyond vulnerability testing, a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).

Penetration testing is often considered or described as ethical hacking. It involves the process of securing a firm or organization's cyber defenses.

The process of penetration testing or security testing includes assessing for exploitable vulnerabilities in networks, web apps, and user security.

Hence, in this case, it is concluded that the correct answer is <u>Penetration testing.</u>

Learn more about <u>penetration testing</u> here: brainly.com/question/13137421

6 0
3 years ago
what would happen if a large number of computer users are attempting to access a web site at the same time that you are
jasenka [17]
It would slow down the whole network if your on the same one

6 0
4 years ago
Read 2 more answers
What Are the Components of a Web Address? *​
ipn [44]

Answer:

What Are the Components of a Web Address?

1.Protocol. The first component of a web address is the protocol, which is also known as the scheme. ...

2.Domain Name. The domain name part of the web address is the unique identifier for the website on the internet. ...

3.Domain Extension. ...

4.Path & Filename.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Free points! your welcome
    9·2 answers
  • What is a custom information field that helps users to find a specific document?
    8·1 answer
  • The cylinder head and engine block are completely sealed by a A. valve seal. B. head gasket. C. intake manifold. D. spark plug
    11·2 answers
  • What is the most common concern with using variable frequency drives?
    6·1 answer
  • Help please
    13·2 answers
  • Brainly bug <br> i had to take a pic because it said it was rude
    10·1 answer
  • Which componet is the smallest unit in a spreadsheet
    15·1 answer
  • 1. Identify one modern technology and discuss its development and discuss what future changes might occur that could have an eve
    13·1 answer
  • Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform fo
    6·1 answer
  • Twisted copper telephone wire, coaxial copper cable, fiber-optic cable, and media for wireless transmission are all __________.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!