1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nina [5.8K]
3 years ago
14

Of the 3 types of loops you learned about, which one is a loop where you specify the number of times it repeats

Computers and Technology
1 answer:
IrinaVladis [17]3 years ago
8 0

Answer:

C

Explanation:

for loop

You might be interested in
What is the best Describe an integer data type
kolbaska11 [484]

Answer:

It is a data type that only holds whole numbers, a.k.a. integers.

what is the picture about?

3 0
3 years ago
Koi friend online hai kya​
Arlecino [84]

Answer:

yes

good afternoon friend

8 0
2 years ago
Waht is the difference between authorization and access control? Access control specifies what a user can do, and authorization
spayn [35]
<h2>Answer:</h2>

Authorization specifies what a user can do, and access control enforces what a user can do.

<h2>Explanation:</h2>

Authorization is simply granting access to an authenticated user of an application. It specifies what a user can and/or cannot do. For example, for a user to access their banking details in an online banking service, they have to be authorized by first authenticating them to prove their identity. Another example is in an organizational system where some users (normally called admins) can access certain database info whereas some other users (normally called the regular users) cannot.

Access control is used to enforce the policies dictated by authorization. In other words, access control enforces the policy of what a user can and/or cannot do. Access control makes authorization possible. It is sometimes called privileges or permissions. For example, the <em>security tab </em>in the operating system of Windows, allow to set access privileges for certain files and/or folders. Another example is in an organizational system where some files on the organization's server are configured in such a way that access to it is restricted and dependent on some further authorization.

5 0
3 years ago
Read 2 more answers
Coefficient of x in expansion (x+3)(x-1)<br>​
neonofarm [45]

Answer:

the coefficient of x here is 4

Explanation:

pls let me know if its wrong or right ..i"ll try another way than:?

5 0
3 years ago
Read 2 more answers
Differentiate between symmetric and asymmetric encryption
Shalnov [3]

Answer:

While symmetric encryption uses a single shared key to encrypt and decrypt data, asymmetric uses two separate keys

8 0
1 year ago
Read 2 more answers
Other questions:
  • Computer hardware had been designed to run a single operating system and a single app, leaving computers vastly underutilized. o
    15·1 answer
  • What do you call the combination of title, description, tags, and thumbnail?
    6·1 answer
  • which of the following is a malicious program that can replicate and spread from computer to computer? A. Email B. Virus C. Spam
    15·1 answer
  • (Business: check ISBN-10) An ISBN-10 (International Standard Book Number) consists of 10 digits: d1d2d3d4d5d6d7d8d9d10. The last
    9·1 answer
  • What term identifies the physical interface between a computer and its peripherals?
    5·1 answer
  • The roll out, roll in variant of swapping is used ____."
    8·1 answer
  • Which key combination will allow users to move to the top of a document?
    15·1 answer
  • What two skills are most important for a meteorologist
    14·2 answers
  • What would happen if computers only had input devices?
    9·1 answer
  • ((GUITAR))<br> What is the letter name for the note shown above?<br><br> D<br> E<br> F<br> G
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!