Answer:
B) nested if...else
Explanation:
In Computer programming, there are four (4) main types of statements used in the decision-making process and these are;
I. If statement.
II. If....else statement.
III. Else.....if statement.
IV. Nested if...else statement.
The nested if...else statement allows you to check for multiple test expressions and execute different codes for more than two conditions. It uses the other three (3) statements in its decision-making process.
However, only the first test expression would be executed when it is true and then the program is terminated. Otherwise, the program would continue to run until it gets to the breaking point (else statement) and then terminates.
Answer:
A possible expense that are not a need are entertainment.
I hope this helped!
There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
Answer: Within other member
Explanation:
The private data member is also known as private function in the computer programming language. The private keyword is basically used to specify the access level and also provide the variable and the methods control to the programmers in the class.
In the class, the variables and the method are directly access by the other methods with the same class but not directly access by the derived class. Therefore, the private members of the class are easily access from the other member of the similar class and also from friends.