1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
3 years ago
15

The following code segment performs a simple encryption routine on string password. How many times does the following loop execu

te? What is the value of password after the for loop terminates?
string password = "notsecure";

for (int i = 0; i < password.length(); i++)

{

password.at(i) += 1;

}
Computers and Technology
1 answer:
Olenka [21]3 years ago
8 0

Answer:

9 times

password == "oputfdvsf"

Explanation:

The loop executes as many times as there are characters in the string.

You might be interested in
Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What di
aalyn [17]

Answer:

I introduced my sister to a thrift app called “Jongo”

Explanation:

Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What did you do? What was the outcome?

While growing up, my sister runs a monthly thrift in our small community, where she collects daily contribution from our neighbors. She does this manually by going around and collecting cash from them. In addition to the risk of cash handling, it was quite stressful and tasking.  

Considering all these, I had to introduce her to a mobile app called “Jongo”, it made the job look easy. All my sister had to do was  

1. Download the app for herself and the contributors  

2. Add them to a group which she created on the app

3. The contributors linked their debit cards to the app and granted access for their account to be debited daily

Due to the cumulative funds, interests was also been accrued daily, hence making it much more easy to do other things in addition to her thrift.  

5 0
3 years ago
A computer operating system software manufacturer invests its profits in creating newer versions of its operating system softwar
PIT_PIT [208]

Answer:

False

Explanation:

Diversification involves increasing the reach of a particular software to meet the needs of different people. When a particular software is developed to provide multiple services for different individuals, it can be categorized as diversification but when the software is improved upon to meet the same users within a specific domain, the software can not be said to be diverse.

From our scenario, the operating system software is improved upon to handle the continuous changes in computer, this does not make the operating system software diverse, it just becomes better.

8 0
3 years ago
Which method tries all possible passwords until a match is found?
barxatty [35]
Brute force is this approach to password cracking. It tires all possible password combinations until a correct match between the hashes is found. It may make use of rainbow tables which contain precomputed password-hash combinations.

Please remember that it helps to provide the choices that match your question. This can help you get an accurate answer and have your question answered much quicker.
7 0
3 years ago
Can anybody tell me how to screenshot on a PC with no "print screen" button?
Liono4ka [1.6K]

There is a extension from google chrome webstore that allows to take a screnshot

8 0
3 years ago
Which three options below describe typographic hierarchy?
Korvikt [17]

The three options that describe the typographic hierarchy are given below:

  • The importance of information is shown through the text.
  • The presentation of the text in terms of structure.
  • The placement of the text defines its flow and hierarchy.

Thus, the correct options are A, B, and C.

<h3>What is Typographic hierarchy?</h3>

Typographic hierarchy may be characterized as an approach that utilizes typography: the size, font, and layout of distinct text components to produce a hierarchical division that can authenticate users where to look for specific information.

The purpose of using this methodology is to focus on the main points of the article accordingly. It increases the sense of understanding of the readers with focus.

Therefore, it is well described above.

To learn more about Typographic hierarchy, refer to the link:

brainly.com/question/12076206

#SPJ1

3 0
1 year ago
Other questions:
  • Kuta software infinite pre- algebra multiplying polynomial and a monomial find product answer key
    14·1 answer
  • In this mode, your presentation will fill up the entire screen. Auto Default Standard Window
    6·2 answers
  • For security reasons a network administrator needs to ensure that local computers cannot ping each other. which settings can acc
    5·1 answer
  • What is the purpose of ergonomics in the workplace? A.Keep workers safe and injury free
    5·2 answers
  • What part of a check is the LEAST important?
    14·2 answers
  • FIGURE A-2—Use the information in this chart to answer Question 2.
    11·1 answer
  • Charts are more effective in attaining attentionthen others methods of presenting data. Do you agree?
    10·1 answer
  • Which wildcard characters will return a single character when using the Find dialog box?
    6·2 answers
  • In C++ write a program that prints out PI as a type double and a type float EXACTLY as shown below. Your program should have ONE
    13·1 answer
  • Need help ASAP.<br> I am so lost.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!