1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natka813 [3]
3 years ago
15

Write a do - while loop to get 20 numbers from the user and sum them together. output the sum after the loop. declare any variab

les you need.
Computers and Technology
1 answer:
Lilit [14]3 years ago
8 0
A do while loop in this situation is actually stupid. A for loop or while loop will suit this purpose better, since you do not need to make sure it executes at least once for the given condition. Do while loops are good for situations where the condition may not be true initially, and you'd like to guarantee execution at least once. E.g circular linked list node counter.
You might be interested in
Al these are benefits of computer literacy except
Harrizon [31]

Explanation:

  • Being computer literate supports entrepreneurship. ...
  • Communication. ...
  • Enhance your employment opportunities. ...
  • Address the gap in your knowledge. ...
  • Computers Reconstruct Business
8 0
3 years ago
Which of the following is NOT a best practice to protect data on your mobile computing device?
OleMash [197]

<u>Lock your device screen when not in use and require a password to reactivate</u> is not a best practice to protect data on your mobile computing device.

<h3>What is a mobile computing device?</h3>

Any device that was built using mobile parts, such as mobile hardware and software, is referred to as a mobile computing device. Portable devices that can function like a typical computing device in terms of operation, execution, and provision of services and applications are known as mobile computing devices.

Portable and handheld computing devices are other names for mobile computing devices.

Modern handheld devices that have the hardware and software needed to run common desktop and Web applications are generally referred to as mobile computing devices. Similar hardware and software elements found in personal computers, such as processors, random memory and storage, Wi-Fi, and an operating system, are also found in mobile computing devices. They are made specifically for mobile architecture and portability, which sets them apart from PCS.

Learn more about mobile computing devices

brainly.com/question/8189998


#SPJ1

4 0
1 year ago
A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.
notka56 [123]

Answer:

Intrusion detection system

Explanation:

An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Any malicious activity or violation is typically reported or collected centrally using a security information and event management system.

4 0
3 years ago
In Adobe illustrator cc 2017 which of the following export file ​
eduard

Explanation:

In Adobe illustrator cc (2017) , of the following export file formats cannot preserve transparency

8 0
3 years ago
Injection attacks variants can occur whenever one program invokes the services of another program, service, or function and pass
velikii [3]

Answer:

True

Explanation:

In Computer science, It's true that injection attacks variants can occur whenever one program invokes the services of another program, service, or function and passes to it externally sourced, potentially untrusted information without sufficient inspection and validation of it.

5 0
3 years ago
Other questions:
  • After a conditional formatting rule is created using the ____ dialog box, the rule is then available for use in the database fro
    11·1 answer
  • A user could find the icon for an attached usb flash drive under what heading in the my computer/computer window?
    7·1 answer
  • Which tcp/ip troubleshooting command should you use to determine whether a client and server are communicating with each other?
    7·1 answer
  • List the memory units inside and outside of the CPU, along with short descriptions of their
    11·1 answer
  • True or false? LearnSmart (the "smart flash card assignments") really gets your competitive spirit in gear by allowing you to se
    8·1 answer
  • Smartphones are the top target for _______ that locks a device and then requests payment for an unlocking code.
    5·1 answer
  • write a program in which the user can enter X amount of numbers. Once the user has enter 10 positive numbers, the user may not e
    7·1 answer
  • Find true or false. A hacker is hacking software with access in sensitive information from your computer​
    9·1 answer
  • Stages of reverse engineering
    8·1 answer
  • In python please.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!