1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
13

Ar count = 10;

Computers and Technology
1 answer:
Alinara [238K]3 years ago
6 0

Answer:

The value of count after the code is executed is 0

Explanation:

According to the code initially the value of count is 10

while (count>0)

{

count=count-2

}

means 10>0 condition is true

count=10-2=8

Again 8>0 condition of while loop is again  true

now count becomes=6

This process repeated untill the condition of while loop is true

and at last count becomes 0 the condition is false (0>0) so count becomes 0 after the code segment is executed

You might be interested in
POINT BOOST:
stiv31 [10]

glenn

she's good what's your

8 0
2 years ago
Which type of cables are used for high-capacity trunk lines that provide main routes for telephone, cable, and internet communic
Naily [24]

Answer:

Fiber-optic cable

Explanation:

Before the cable industry transitioned to fiber-optic cables, for many years, the standard cables used for telephone, cable, and internet communications were coaxial cables. The transition was made possible because the architecture of the fiber-optic cable came with a higher capacity, more extensive bandwidth link. Unlike the coaxial or the twisted pair cable, the fiber-optic is made from glass strands that transmit light signals much quicker and to greater distances. This makes fiber-optic cables the fastest high capacity data transfer link than any other cables to ever exist.

3 0
3 years ago
Please help me on this it’s due now
olga2289 [7]

Answer:

All of the Above

Explanation:

TDL professionals meet all of these options.

6 0
2 years ago
Differentiate between symmetric and asymmetric encryption
Shalnov [3]

Answer:

While symmetric encryption uses a single shared key to encrypt and decrypt data, asymmetric uses two separate keys

8 0
1 year ago
Read 2 more answers
Enterprise software is designed for organizations to __________.
klemol [59]

Answer:

The goal of enterprise software is to enable the activities of large organizations, supporting a wide range of different user roles.

6 0
2 years ago
Other questions:
  • What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more
    10·1 answer
  • Ld' is the instruction with the longest latency on the CPU from Section 4.4 (in RISC-V text). If we modified ld and sd so that t
    15·1 answer
  • Consider the provided C++ code in the main.cpp file: The function func2 has three parameters of type int, int, and double, say a
    8·1 answer
  • A. True
    7·1 answer
  • What is the term used for describing the judgement or common sense part of problem solving​
    11·1 answer
  • In python,_______ are used to define the conditions necessary for a while loop to run.
    7·2 answers
  • Describe the basic features of the relational data model and discuss their importance to the end user and the designer. Describe
    9·1 answer
  • 2. Used to drive in or remove screws that fasten electrical wires or other electrical accessories. A. Pliers C. Screwdrivers B.
    15·1 answer
  • What is a best practice when approaching an automation effort?
    6·1 answer
  • You can easily merge files even if each file contains a different record layout. Group of answer choices True False
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!