1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tester [92]
3 years ago
8

Can someone help me with...A table can help? PLEASE

Computers and Technology
1 answer:
algol [13]3 years ago
3 0

Answer:

A table cannot help people

You might be interested in
Here's another question!<br><br> What is some iterative programming structure uses?
inn [45]

Answer

Often in an algorithm, a group of statements needs to be executed again and again until a certain condition is met, this is where we find the need for iteration.

The repeated execution of some groups of code statements in a program is called iteration.

In iteration control structures, a statement or block is executed until the program reaches a certain state, or operations have been applied to every element of a collection. This is usually expressed with keywords such as while, repeat, for, or do..until.

The basic attribute of an iteration control structure is to be able to repeat some lines of code. The visual display of iteration creates a circular loop pattern when flowcharted, thus the word “loop” is associated with iteration control structures. Iteration can be accomplished with test before loops, test after loops, and counting loops. A question using Boolean concepts usually controls how often the loop will execute.

Applications of Iteration

Iteration methodology has various applications in the programming world

  • Problem-solving in arrays, vectors, lists, strings, etc.
  • Problem-solving using Stack, Queue and Priority Queue
  • Bottom-up implementation of Dynamic Programming
  • Implementation of greedy algorithms
  • BFS traversal of tree and graph
  • Problem-solving using Hash Table and BST
  • Iterative Implementation of recursive code using stack

Iteration (Repetition) Control Structures

pseudocode: While

count assigned zero

While count < 5

   Display "I love computers!"

   Increment count

End

pseudocode: Do While

count assigned five

Do

   Display "Blast off is soon!"

   Decrement count

While count > zero

pseudocode: Repeat Until

count assigned five

Repeat

   Display "Blast off is soon!"

   Decrement count

Until count < one

pseudocode: For

For x starts at 0, x < 5, increment x

   Display "Are we having fun?"

End

7 0
3 years ago
11111 Power 2 sovle ​
erastovalidia [21]
123,454,321. you just multiply 11111 by itself
4 0
3 years ago
Which of the following is not a danger of blogging
Ainat [17]
D. staying connected with an old friend.

4 0
3 years ago
Read 2 more answers
Why do we need to learn about engineering and technology?
inna [77]

Answer:

<em>Science, technology, engineering and mathematics workers play a key role in the sustained growth and stability of the U.S. economy, and are a critical component to helping the U.S. win the future. STEM education creates critical thinkers, increases science literacy, and enables the next generation of innovators.</em>

8 0
3 years ago
Two middle-order batsmen are compared based on their performance in their previous cricket match.
Zolol [24]
How many points is this for
5 0
4 years ago
Other questions:
  • The manufacturer doesn't need it the buyer doesn't want it the user doesn't know they're using it
    6·1 answer
  • Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log o
    9·1 answer
  • 50 POINTS &amp; A FOLLOW!
    11·2 answers
  • Who gets the reply when you use the reply all feature in a mail program?
    14·1 answer
  • What is the purpose of a report?
    6·2 answers
  • Write the simulate method, which simulates the frog attempting to hop in a straight line to a goal from the frog's starting posi
    10·1 answer
  • which driver must be running and configured to enable a PC to communicate with a CompactLogix PLC on an Ethernet network
    10·1 answer
  • Made from fruit juice, water and sugar, The American version contains milk and cream and sometimes egg white​
    9·1 answer
  • A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code.
    7·2 answers
  • An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans f
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!