1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ira Lisetskai [31]
4 years ago
5

When do on loop conditions happen? (1 point)

Computers and Technology
1 answer:
LuckyWell [14K]4 years ago
6 0
On loop conditions happen when : 
when another event's start loop action tell it to happen
It refers to the way computer programs repeat one or two steps depending on the circumstances

hope this helps
You might be interested in
What is one of the disadvantages of a server-based network compared to a peer-to-peer network?
padilas [110]

One of the disadvantages of a server-based network compared to a peer-to-peer network is: 1) Additional costs.

<h3>What is a server?</h3>

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

<h3>Types of server.</h3>

In Computer technology, there are different types of server and these include the following:

  • Web server
  • Email server
  • File server
  • Database server
  • Proxy server

<h3>What is a Peer to Peer (P2P) Network?</h3>

In Computer networking, a Peer to Peer (P2P) network can be defined as a type of network that are designed and developed to connect similar computers that share data and software with each other at lesser cost in comparison with other network service.

In this context, we can infer and logically deduce that one of the disadvantages of a server-based network compared to a peer-to-peer network is additional costs.

Read more on Peer to Peer Networks here: brainly.com/question/1932654

#SPJ1

Complete Question:

What is one of the disadvantages of a server-based network compared to a peer-to-peer network?

1) Additional costs

2) none of these choices

3) Decentralized data access

4) Less secure

5) Difficult to expand

6 0
2 years ago
When using Identify from the IPDE cycle, you are trying to _____.
Thepotemich [5.8K]

B) observe hazards in your environment.

8 0
3 years ago
Read 2 more answers
_______ data updates in your destination document if there are changes to the source data.
Lynna [10]
Linked or integrated
5 0
3 years ago
Pseudocode is an improvement over the IPO chart because it lays out the a0 sequence of steps for a particular program.
katrin2010 [14]

Answer: Pseudocode represents a language like solution

Explanation:

Pseudocode can be defined as one of the informal ways of programming whose description doesn't require any strict programming language syntax or even underlying technological considerations because it's evident that, it's not actually a real programming language . It is used major for an outline/rough draft of a required program. It also summarizes the flow of program, excluding underlying details. Designers usually write pseudocode in order for programmers to fathom the project's requirements of the software and align code appropriately.

5 0
4 years ago
Read 2 more answers
How does social network use message to entertain?
Marizza181 [45]

Answer:

Explanation:

Social Network allows for easy creation of large groups of people that have the same tastes or are looking for the same thing. This allows for easy ways to entertain by providing what these individuals are looking for. Whether it is funny pictures, animal videos, news, celebrity videos, etc. Basically this ability to group individuals together by taste is what allows social networks to entertain through mass messaging in a way that is effective and gets the media in front of huge audiences.

3 0
3 years ago
Other questions:
  • The keyboard, mouse, trackpad, microphone, light pen, and voice recognition are examples of _____ devices.
    5·1 answer
  • Which technology forms the foundation for cloud computing? forms the foundation for cloud computing.
    12·2 answers
  • To run a PHP application that has been deployed on your own computer, you can enter a URL in the address bar of your browser tha
    13·1 answer
  • I have at least 20-30 typing entries on my keyboarding log <br><br><br> true or false
    8·1 answer
  • the penalties for ignoring the requirements for protecting classified information when using social networking services are ____
    12·1 answer
  • What is word wrapping??
    5·1 answer
  • A chain of dry-cleaning outlets wants to improve its operations by using data from
    7·1 answer
  • g Write a program that allows a user to input any text in your program. Using the tools that we have discussed, your program sho
    6·1 answer
  • Need help:(!!!! I’ll mark brainliest if correct
    5·1 answer
  • Assume that the variable myString refers to a string. Write a code segment that uses a loop to print the characters of the strin
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!