1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rusak2 [61]
4 years ago
7

What output is produced by the following code fragment int num = 1 max = 20 while num < max?

Computers and Technology
1 answer:
Alchen [17]4 years ago
3 0
Firstly, you'd generate a compile error.

I don't know what language you're using, but you need to have a comma before declaring max, to tell the compiler you're creating another variable of type int. Additionally, you didn't end that line with a semi-colon (again, I don't know what language you're using, so this semi-colons could be irrelevant, such as in Python). Finally, a condition in a while loop is usually encapsulated by parentheses, like this "while (num < max)", and braces are introduced if you're creating a while loop greater than 1 statement.

But to answer your question. No output.
You might be interested in
True or False: Changing a bid package's status to "Closed" removed it from the bidder's Planroom and the bidder will no longer b
Readme [11.4K]

Answer:

True

Explanation:

It's actually true because once a bidding page status changes to closed, it means that the timeframe for bidding has stopped, hence, no bidder will be able to bid again.

7 0
3 years ago
Impact of information technology in the society​
GarryVolchara [31]

Answer:

led to exposure of dangerous things

3 0
3 years ago
The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
gayaneshka [121]

Answer:

D. Network vulnerability database

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.

Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.

5 0
3 years ago
What network setting do i need for a workgroup?
juin [17]
Joining a workgroup requires setting up the PC with a workgroup name.
5 0
3 years ago
What is microsoft excel​
Andrei [34K]

Answer:

A spreadsheet program included in Microsoft Office suit of application. Spreadsheets present tables of value arranged in rows and columns that can be manipulated mathematically using both basic and advanced functions.

6 0
3 years ago
Read 2 more answers
Other questions:
  • What is the main characteristic of a Peer-to-Peer (P2P) network?
    8·1 answer
  • Henry went to an IT software company for an interview he was offered a position in lower level management which positions could
    11·1 answer
  • When searching the web software programs called fetch a few web pages and then they follow the links on those pages and fetch th
    9·2 answers
  • Columns are labeled with letters and Rows are labeled with numbers.
    5·1 answer
  • Given a String variable named line1 and given a Scanner reference variable stdin that has been assigned a reference to a Scanner
    11·1 answer
  • En que se diferencia el software y el hardware
    7·2 answers
  • A network systems administrator would most likely help with
    13·2 answers
  • What is the language of computers?
    9·1 answer
  • The right to make others do things is referred to as _________.
    14·2 answers
  • What is the decimal number 86 when written as a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!