1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Assoli18 [71]
3 years ago
14

When an application contains an array and you want to use every element of the array in some task, it is common to perform loops

that vary the loop control variable from 0 to one less than the size of the array.
A) True
B) False
Computers and Technology
1 answer:
Elodia [21]3 years ago
7 0

Answer:

 Option A(True) is the correct answer for the above question.

Explanation:

  • An array is used for the collection variables which is of the same type and uses memory in continuous Passion for the storage.
  • When any user wants to use the array then he needs to declare the size and type of the array because array holds the same type of data.
  • For example, int a[5] is an array of integer variable whose name is 'a' and the size is 5 in c language.
  • Anyone can use the array with the help of the index value of the array. The starting index value is 0 and the ending index value is (size-1) for any array.
  • The user can use it by the help of loop, in which the loop variable refers to the index of the array and it starts from 0 and ends in the (size of the array-1).
  • It is because the loop executes the same line multiple times.
  • The above statement also wants to state, which is defined as above. Hence the above statement is true which is referred by option A. Hence option A is the correct answer.
You might be interested in
HELPPPPPPP!!!!!!!!!
Andrei [34K]
The compression ratio is 20:1 please mark me brainliest
3 0
3 years ago
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authen
Ksju [112]

Answer: Authorization process

Explanation

Authorization is a security measure to determine the access levels or user/client rights to use to system resources like files, computer programs, data and other features on a computer. Authorization process is the process of granting or denying access to a network resource that allows the user access to various resources based on the his/her identity.

Most web security systems are based on a two-step Authorization process. The first step ensures and approves the user's identity, that is authentication and the second stage is authorization, which allows the user to access the various resources based on the user's identity.

Therefore the first thing you should do when you suspect "illicit use of, or threats to, computer resources and sensitive information is a strong authentication and authorization process".

5 0
4 years ago
Tell me the defination of working principle of computer with all information​
Rudik [331]

Answer:

Computer do the work primarily in the machine and we can not see, a control centre that converts the information data input to output.

Explanation:

Please mark as brainlist please please!

7 0
4 years ago
Why should the government create money it doesn’t have?
murzikaleks [220]

Answer:

to increase economy of the country

Explanation:

if the government does so the people will be able to access the money this increasing government revenue. This increasing the economy

8 0
3 years ago
Read 2 more answers
Question, who wants 100 points?
Alexandra [31]
Me and well thank you
8 0
3 years ago
Read 2 more answers
Other questions:
  • Once your hard drive is installed what needs to be done to the drive and what do these two tasks do
    12·1 answer
  • Which of the following allowed Temple Grandin to design more humane means of slaughtering cattle? she treated the cattle as inca
    5·2 answers
  • Most documents are printed in ______ orientation
    9·2 answers
  • The content of a text is its
    8·1 answer
  • The first step in the information processing cycle involves the _____ of data.
    10·1 answer
  • What is the key function of a sales team?
    13·1 answer
  • Which of the following is the best way to locate books and research from all over the United States and abroad?
    9·2 answers
  • Please can someone help my assignment.​
    13·1 answer
  • (python) Given the formula for conversion from Celsius to Fahrenheit
    10·1 answer
  • Which of these is an example of output?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!