1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LuckyWell [14K]
3 years ago
15

Cyberterrorism is the use of terrorism to attack (Points : 1) public libraries. computer based networks. government spy networks

. the Food and Drug Administration.
Computers and Technology
1 answer:
slega [8]3 years ago
7 0
Computer based networks, and possibly government spy networks... or, in some cases, email.
You might be interested in
Which osi layer defines the functions of logical network-wide addressing and routing?
IRISSAK [1]
Answer: The Network Layer
5 0
4 years ago
Here's another question!<br><br> What is some iterative programming structure uses?
inn [45]

Answer

Often in an algorithm, a group of statements needs to be executed again and again until a certain condition is met, this is where we find the need for iteration.

The repeated execution of some groups of code statements in a program is called iteration.

In iteration control structures, a statement or block is executed until the program reaches a certain state, or operations have been applied to every element of a collection. This is usually expressed with keywords such as while, repeat, for, or do..until.

The basic attribute of an iteration control structure is to be able to repeat some lines of code. The visual display of iteration creates a circular loop pattern when flowcharted, thus the word “loop” is associated with iteration control structures. Iteration can be accomplished with test before loops, test after loops, and counting loops. A question using Boolean concepts usually controls how often the loop will execute.

Applications of Iteration

Iteration methodology has various applications in the programming world

  • Problem-solving in arrays, vectors, lists, strings, etc.
  • Problem-solving using Stack, Queue and Priority Queue
  • Bottom-up implementation of Dynamic Programming
  • Implementation of greedy algorithms
  • BFS traversal of tree and graph
  • Problem-solving using Hash Table and BST
  • Iterative Implementation of recursive code using stack

Iteration (Repetition) Control Structures

pseudocode: While

count assigned zero

While count < 5

   Display "I love computers!"

   Increment count

End

pseudocode: Do While

count assigned five

Do

   Display "Blast off is soon!"

   Decrement count

While count > zero

pseudocode: Repeat Until

count assigned five

Repeat

   Display "Blast off is soon!"

   Decrement count

Until count < one

pseudocode: For

For x starts at 0, x < 5, increment x

   Display "Are we having fun?"

End

7 0
3 years ago
Smileys Pizzeria has a special on cheese pizza this month. 6- inch personal pizzas are $5, 10-inch small pizzas are $8, 14-inch
ValentinkaMS [17]

Answer:

THE PROGRAM IS ANEW ONE IT IS CALLED SMILEYS CHOOSER

Explanation:

4 0
3 years ago
Modify the program so that it can do any prescribed number of multiplication operations (at least up to 25 pairs). The program s
Anestetic [448]

Answer:

Im trying to prove to my parents that im smart.. so.. its 2.7! :D

Explanation:

4 0
4 years ago
Convert the decimal number -12 to hexadecimal (2's complement)
Helga [31]

Answer:

FFF4

Explanation:

Binary representation of 12 = 00001100

Expressing it in hexadecimal format : 0C

Binary representation of -12:

Step 1 : Computing 1's complement for 12 =11110011

Step 2 : Adding 1 to 1's complement to get the 2's complement =>

11110011+1 = 11110100

Converting the 2's complement representation to hexadecimal format:

F4 ( 8 bit representation) or FFF4 ( 16 bit representation)

4 0
4 years ago
Other questions:
  • Nadia's productivity at work is being hurt due to the large quantity of unwanted e-mail she receives. What steps can she take to
    8·1 answer
  • A program is divided into 3 blocks that are being compiled on 3 parallel computers. Each block takes an Exponential amount of ti
    6·1 answer
  • Why do i have to wait and watch videos
    11·1 answer
  • Name 8 different types of packages that are widely used​
    8·1 answer
  • if you play creative destruction and if u have a mic and if u play it 24/7 and would like to form a team tell me your name or yo
    7·1 answer
  • Which of these tax forms reports an employee's yearly social security tax withheld
    11·2 answers
  • Write a c++ program to print even numbers from 1 to 20​
    15·1 answer
  • Hannah wanted to watch a movie. She typed the movie name on the search engine. In result she found the downloadable link of the
    10·1 answer
  • 8.10 Code Practice Question 1
    12·1 answer
  • Service-oriented architecture includes "reuse." Which of the following is a description of why a business finds it useful? Using
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!