1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
4 years ago
15

The following code segment performs a simple encryption routine on string password. How many times does the following loop execu

te? What is the value of password after the for loop terminates?
string password = "notsecure";

for (int i = 0; i < password.length(); i++)

{

password.at(i) += 1;

}
Computers and Technology
1 answer:
Olenka [21]4 years ago
8 0

Answer:

9 times

password == "oputfdvsf"

Explanation:

The loop executes as many times as there are characters in the string.

You might be interested in
If you enter 234.567 into a cell that is formatted to display 1 decimal place, what is the value stored in the cell?
Jobisdone [24]
Answer C because you would round up to .6 since that is the tenths (aka the first) decimal place
4 0
3 years ago
Which part of color theory deals with how colors on a web page relate to each other?
Elena L [17]

Answer:

C) Matching

Explanation:

5 0
4 years ago
Read 2 more answers
Sonora wants to extend the cells to be added in her formula. what is the quickest way to add more sells?
alexira [117]
It’s D left click that’s the answer
8 0
4 years ago
Read 2 more answers
Ang Kabihasnang ito ay umusbong sa rehiyon ng Timog Mexico
Westkost [7]

Answer:

nahh I'm still in disbelieve

8 0
3 years ago
Which protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication?
amid [387]

The L2TP or Layer 2 Tunneling Protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication.

<h3>What is vpn?</h3>

VPN is known as a Virtual Private Network extends a private network across a public network and activates users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

The main difference between VPN proxy and a VPN is encryption and VPNs hides all the web activities performed by the user as well as user's private IP address.

Therefore, the L2TP or Layer 2 Tunneling Protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication.

Learn more about VPN here:

brainly.com/question/17272592

#SPJ4

3 0
2 years ago
Other questions:
  • Poems Roses are red,
    15·1 answer
  • What does a graphic organizer do
    6·1 answer
  • Do you think cyber-bulling is more damaging, as damaging, or less damaging than in-person bullying? Why?
    11·2 answers
  • Describe the steps to play a presentation the way your audience will see it.
    8·2 answers
  • Write a Bash script that takes the name of a file or directory as an argument, 1. reports if it is a directory or a file, and if
    14·1 answer
  • Which of the following is time-dependant? Group of answer choices
    8·1 answer
  • Which of the following are TRUE? A function can call another function. As long as the function is defined anywhere in your progr
    14·1 answer
  • If you have 128 oranges all the same size, color, and weight except one orange is heavier than the rest. Write down a C++ Code/A
    7·1 answer
  • Instruction: weird I know (~ ̄³ ̄)~
    5·1 answer
  • Can we use a data type as a condition in C++?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!