1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinil7 [7]
4 years ago
10

You have just started working for XYZ Solutions as a programmer. Your first assignment is to review and correct various code so

that you can become familiar with the company's programs. You changed the Do clause to the correct For clause in the previous problem. You also changed the Loop keyword to the Next keyword for the For...Next loop. What else needs to be changed about the Do loop?
Computers and Technology
2 answers:
Molodets [167]4 years ago
6 0

Answer:

For intCounter = 1 To 3

Explanation:

jonny [76]4 years ago
3 0

Answer:

for intCounter As Integer = 1 To 3, this is done to get familiar with the Company's program and normally the next thing to change in the do loop.

You might be interested in
How precisely can you rotate a graphic in a document?
Cloud [144]
Any picture of what our talking about
4 0
3 years ago
Which keyboard shortcut can you use to copy data from a cell? HURRY UP PLZ RIGHT NOW HURRY.
Romashka-Z-Leto [24]
The keyboard shortcut used to copy data from a cell is A.) Ctrl + c command +C

I hope this helped!! :)
7 0
3 years ago
Read 2 more answers
Which employees work directly with customers, helping them make deposits and withdrawals?
d1i1m1o1n [39]
I believe the answer is customer service
5 0
3 years ago
Read 2 more answers
If you want to create header, clicker the add a header button on the ___ tab
Finger [1]
On the insert tab
------------------------
6 0
3 years ago
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
lions [1.4K]

Answer:

chosen ciphertext

Explanation:

Chosen ciphertext attack is a scenario in which the attacker has the ability to choose ciphertexts C i and to view their corresponding decryptions – plaintexts P i . It is essentially the same scenario as a chosen plaintext attack but applied to a decryption function, instead of the encryption function.

5 0
3 years ago
Other questions:
  • Java languageThe cost to ship a package is a flat fee of 75 cents plus 25 cents per pound.1. Declare a constant named CENTS_PER_
    5·2 answers
  • A chart generated in Microsoft Excel can be plugged into a presentation authored used PowerPoint?
    8·1 answer
  • Memory management is concerned with __________.
    14·1 answer
  • When your phone sends/receives text messages (specifically using SMS), the total data sent/received contains more than just your
    8·2 answers
  • The emergence of MP3 (iPod) technology is an example of creative destruction because a. It is less expensive than compact discs
    14·1 answer
  • What is the purpose of the domain name? The domain name is an example of a service provider. The domain name .gov.nz is an examp
    15·2 answers
  • When changing lanes on an expressway signal your intentions and?
    8·1 answer
  • One of Kyle’s clients called to complain that his computer was running really slow. Kyle went to the client’s work area and star
    6·1 answer
  • hey guys. I have bitmoji but the stickers just won't load. it says 'we couldn't retrieve you stickers, or says an error message.
    5·1 answer
  • You're a teacher and you've created a form letter in word that you send to the parents of the students in your class at the begi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!