1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
4 years ago
15

The following code segment performs a simple encryption routine on string password. How many times does the following loop execu

te? What is the value of password after the for loop terminates?
string password = "notsecure";

for (int i = 0; i < password.length(); i++)

{

password.at(i) += 1;

}
Computers and Technology
1 answer:
Olenka [21]4 years ago
8 0

Answer:

9 times

password == "oputfdvsf"

Explanation:

The loop executes as many times as there are characters in the string.

You might be interested in
Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, a
lidiya [134]

Answer:

The correct answer to the following question is Hairpinning.

Explanation:

Hairpinning is the returning message from one origin end-point and back in that direction from where it came, as the way to get it to the destination end-point.

All the conventional telephones systems use both digital and analog hairpinning connections.

In the VoIP (Voice over Internet Protocol), the hairpinning can be avoided and the two endpoints are connected after call has been initiated. This form of communication has following call setups which is called as shuffling.

5 0
3 years ago
What is a method whereby new problems are solved based on the solutions from similar cases solved in the past?
swat32

Answer:

"Case-Based Reasoning" is the answer for the above question.

Explanation:

  • Case-Based Reasoning is a process of decision-making theory in which the new problems were solved based on the previously solved problem.
  • It is used in artificial intelligence and robots. This helps to make any AI and robots to do the work and take decisions on its own.
  • The theory is used to make any computer that behaves like humans. It can take decisions like a human.
  • The above question asked about the method by which the new problem is solved on behalf of the old problem. Hence the answer is "Case-Based Reasoning".
3 0
3 years ago
Does any body like animal jam
cricket20 [7]

Answer:

Never used it so I do not know.

Explanation:

To be honest i thought you meant like animal jelly at first

7 0
4 years ago
Read 2 more answers
How to make a website
hjlf

Answer:

You need an email and a job and to be over 18 for business ones or a legal gaurdian if you have none then ur hecced uwu :333

8 0
3 years ago
Read 2 more answers
Which Internet protocol (IP) packet fragmentation header field specifies where the fragment belongs in the original datagram
Yanka [14]

An Internet protocol (IP) packet fragmentation header field which specifies where the fragment belongs in the original datagram is the fragment offset.

<h3>What is the TCP/IP model?</h3>

The TCP/IP model is known as the Internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model and it can be defined as a standard framework that is designed and developed for the transmission (prepare and forward) of information on the Internet.

In the TCP/IP model, a fragment offset simply refers to an Internet protocol (IP) packet fragmentation header field which is used to specify where the fragment belongs in the original datagram.

Read more on Internet protocol here: brainly.com/question/17387945

#SPJ1

8 0
2 years ago
Other questions:
  • Identify the parts used in an electric circuit- Tiles
    9·2 answers
  • Brandon purchased a new processor online as an upgrade. When he purchased the processor, he made sure that it used the same sock
    14·1 answer
  • I really love my voice when not recorded. Now when I record my voice, I feel like its high pitched and horrible. Do I really sou
    11·1 answer
  • The northern half of this continent is primarily rainforest and savanna.
    5·1 answer
  • Please help I’ll mark brainliest!
    12·2 answers
  • Can you please help me?
    6·1 answer
  • Macro mode is used to take landscape photographs of subjects fairly far from the camera.
    12·2 answers
  • Why is computer called and information processing machine​
    6·1 answer
  • What are the five generations of computer software​
    13·1 answer
  • which of the following is acomputer program that detects, prevents. and takes action sto deactivate or remove malicious programm
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!