1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
13

Ar count = 10;

Computers and Technology
1 answer:
Alinara [238K]3 years ago
6 0

Answer:

The value of count after the code is executed is 0

Explanation:

According to the code initially the value of count is 10

while (count>0)

{

count=count-2

}

means 10>0 condition is true

count=10-2=8

Again 8>0 condition of while loop is again  true

now count becomes=6

This process repeated untill the condition of while loop is true

and at last count becomes 0 the condition is false (0>0) so count becomes 0 after the code segment is executed

You might be interested in
Most scheduling algorithms maintain a run queue, which lists processes eligible to run on a processor. On multicore systems, the
VMariaS [17]
No clue. This is because the morning shines bright in the evening.
7 0
2 years ago
What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any p
andreyandreev [35.5K]

Answer:

any program designed to do harm.

Explanation:

Malware is a program that was created by someone with malicious intent. Malware can target your windows system files and damage windows(or what ever os you use). Malware can corrupt files and even lock you out of your computer.

4 0
3 years ago
Whereas lines of competition are clearly defined in the more established industries, in the Internet industry they are blurred a
VMariaS [17]

Answer:

C. The lines of competition are clearly defined in the more established industries, unlike the Internet where they are blurred and indistinct, as companies that compete

Explanation:

The first one is also correct, but it is a little bad for reading. D has a spelling error, and "companies competing" in B are a little blurred. All, except last, are correct. However, considering arrangements, the 'C 'option is the best.

8 0
3 years ago
A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify a
yarga [219]

Answer:

Intrusion detection systems

Explanation:

Intrusion detection systems (IDS) are systems designed to monitor network use for any potential hacking or suspicious activity and then take measures to issue alerts upon discovery of such activity. IDS are applications that help secure a network or system from policy breaching or other activities that may be harmful to the network. There are four major types of IDS and they are: Perimeter Intrusion Detection System (PIDS) , Network intrusion detection system (NIDS), VM based Intrusion Detection System (VMIDS), and Host-based intrusion detection system (HIDS) .

7 0
3 years ago
How many megapixels is in a macbook air 2017 camera
Anastasy [175]

Answer:

.7

Explanation:

3 0
3 years ago
Other questions:
  • What is an example of asynchronous communication
    7·1 answer
  • The code segmentif (speed <= 40)cout << "Too slow";if (speed > 40 && speed <= 55)cout << "Good spee
    11·1 answer
  • Which word in brackets is most opposite to the word in capitals? PROSCRIBE (allow, stifle, promote, verify)​
    14·2 answers
  • A(n) ______ system is a set of programs that coordinates all the activities among computer or mobile device hardware. a. managem
    10·1 answer
  • ____________ are collected from several entities at the same point in time.
    13·1 answer
  • The design of a blog refers to:
    10·1 answer
  • If cell G7 contains the function ________, it states that if the value in cell C3 is 9, the number 7 will be assigned to cell G7
    6·1 answer
  • Braxton is writing a program to design t-shirts. Which of the following correctly sets an attribute for color?
    7·1 answer
  • A customer wants to increase his storage capacity by 25gb
    7·1 answer
  • What type of malicious software technology is used to download and install software without the user's interaction?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!