1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAXImum [283]
3 years ago
13

2. Trace through the following loop and show the values for A, B & C.

Computers and Technology
1 answer:
Butoxors [25]3 years ago
4 0

At the beginning, we have

A = 4, B = 3, C = 0

Although you didn't specify the programming language, usually 0 means false, so we never enter the first loop, because "while C" is never true.

We enter the second loop because B is different from A, so we decrease C by 1, and we have

A = 4, B = 3, C = -1

and we assign B = B-C, so now B becomes 3-(-1)=3+1=4. Now B=A and we exit the second loop, and we have

A = 4, B = 4, C = -1

You might be interested in
NEED HELP ASAP! BRAINLIEST AND 20 PTS TO CORRECT ANSWER!
son4ous [18]

The correct answer is C.

8 0
3 years ago
Six security issues and six descriptions are shown below.
Trava [24]

Answer:

The answer to this question is given below in the explanation section

Explanation:

This question contains six securities terms and definitions.

The goal of this question is to properly map the term to its correct description/definition.

You can find the complete mapping in the attached image.

7 0
3 years ago
How can ICTs be used in the workplace to improve the way employees
nadezda [96]

Answer:

it allows them to work more efficiently, with fewer waisted resources

Explanation:

3 0
3 years ago
In 1993, a group of professors and students at the University of Illinois National Center for Supercomputing Applications (NCSA)
Vladimir [108]

Answer:

The answer is "False"

Explanation:

The given statement is false, which can be described as follows:

The Netscape browser is also known as the series of the name web browsers, This browser was developed by AOL's former holding company Netscape Communicative Networks Organization.

  • It was a corporation, that has been best remembered for its Navigator web browser.  
  • It is one of the two web browsers most successful in the 1990s, that's why the given statement is false.

7 0
3 years ago
You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what
Lynna [10]

Answer:

EFS on NTFS

Explanation:

EFS (Encryption File System) allows users to store confidential information about a computer when people who have physical access to your computer could otherwise compromise that information, intentionally or unintentionally. EFS is especially useful for securing sensitive data on portable computers or on computers shared by several users.  An attacker can also steal a computer, remove the hard drive(s), place the drive(s) in another system, and gain access to the stored files. Files encrypted by EFS, however, appear as unintelligible characters when the attacker does not have the decryption key.

The Encrypting File System (EFS) that is included with the operating systems provides the core file encryption technology to store NTFS files encrypted on disk.

7 0
3 years ago
Other questions:
  • The number of operations executed by algorithms A and B is 40n2 and 2n3, respectively. Determine n0 such that A is better than B
    12·1 answer
  • In Web design, What kind of tag is referred to as fixed ?<br>​
    7·1 answer
  • Emerson needs to tell his browser how to display a web page. Which tool will he use?
    8·2 answers
  • Why is the most important factor for investors always the quality of the venture's leadership team
    12·1 answer
  • Write a programme with C++ language wich print the biggest number in between three numbers , whith INT
    14·1 answer
  • Describe from an administrator perspective what is necessary to prepare a storage device for access by a user.
    14·1 answer
  • List 10 examples of computer ethics<br>(please give even 1 if you can, I need it urgently) ​
    10·1 answer
  • Tamara is writing a program to organize students in a class and needs to use operators to organize student grades, then compare
    9·1 answer
  • Fundamental of Computer Science
    15·1 answer
  • Name four successful conversions to an electronic health record system in a medical facility
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!