1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
3 years ago
5

Provide trace tables for these loops. a. int i = 0; int j = 10; int n = 0; while (i < j) { i++; j--; n++; } b. int i = 0; int

j = 0; int n = 0; while (i < 10) { i++; n = n + i + j; j++; } c. int i = 10; int j = 0; int n = 0; while (i > 0) { i--; j++; n = n + i - j; } d. int i = 0; int j = 10; int n = 0; while (i != j) { i = i + 2; j = j - 2; n++; }
Computers and Technology
1 answer:
Eduardwww [97]3 years ago
3 0

Answer:

Following  show the trace table.

Explanation:

a)

int i = 0; int j = 10; int n = 0;

while (i < j) { i++; j--; n++;

}

i                  j             n

1                  9           1

2                 8           2                                              

3                 7            3

4                 6            4  

5                5             5                                                

b)                  

int i = 0; int j = 0; int n = 0;

while (i < 10) { i++; n = n + i + j; j++;

}

i                j             n          

1               1             2

2              2            4

3              3            9      

4              4            16

5              5            25

6              6           36

7               7           49

8               8           64

9               9           81

10             10          100

c)

int i = 10; int j = 0; int n = 0;

while (i > 0) { i--; j++; n = n + i - j; }

i              j           n

9            1           8

8           2           14  

7            3           18

6            4          20

5            5           18

4            6           14

3           7            8

2           8            0

1            9           -10

d)

int i = 0; int j = 10; int n = 0; while (i != j) { i = i + 2; j = j - 2; n++; }

i                 j                n

2                8               1

4                6               2

6                4               3

8                2               4

10              0                5

12             -2                6

14             -4                 7

...               ...                ...

...               ...               ...    

...              ...                ...

You might be interested in
The superintendent forbade the students to bring their books and copies in the exam hall. (into direct speech)​
nata0808 [166]

Answer:

in direct speech, we convey the message of the speaker in his own actual words without any change to another person.

Explanation:

7 0
4 years ago
Once a graph has been created, you would need to start over to make any changes to it?
spin [16.1K]
False, when you make a graph you can make many changes to it. It doesn't matter what kind of graph or where you make the graph on most applications you have to the option to make it exactly how you want it or change it after you have created it. 
8 0
4 years ago
Does anyone know any nitro type hack??
alexgriva [62]

Answer:

yes nitro hack is where they time your hacking skills

5 0
4 years ago
Read 2 more answers
A _______ is used to analyze and summarize your data without graphical support
kkurt [141]
<span>A Pivot table is used to analyze and summarize your data without graphical support</span>
3 0
4 years ago
Read 2 more answers
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
Other questions:
  • URGENT!! You decide not to use any recipes or information from the "Don't Be an Animal Murderer" Web site. What characteristic o
    7·2 answers
  • Riley is using access to collect data for a science project. he is creating a report and wants to apply predefined color and fon
    6·1 answer
  • _______________________ is a short-term program, typically 30 hours long, in which a therapist, social worker, or trained probat
    5·1 answer
  • How to transfer photos from iphone to iphone?
    14·2 answers
  • 4.3 Code Practice<br> edhisve
    13·1 answer
  • On React
    13·2 answers
  • Write a summary on the video "Greatest Inventions w/Bill Nye".
    10·1 answer
  • Where are my files shortcut in documents folder.
    14·1 answer
  • where element is the Hypertext Markup Language (HTML) element and _____ pairs define the styles that are applied directly to tha
    6·1 answer
  • Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip, allowing ____ to be even
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!