1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
3 years ago
8

Which type of loop is best if you do not know how many times you need the loop to run?

Computers and Technology
1 answer:
Alex3 years ago
5 0
While: <span> the loop must repeat until a certain "condition" is met.  If the "condition" is FALSE at the beginning of the loop, the loop is never executed.  The "condition" may be determined by the user at the keyboard.  The "condition" may be a numeric or an alphanumeric entry.  <span>This is a good, solid looping process with applications to numerous situations. 
</span></span><span>while:<span>int ctr = 1;
while (ctr < = 20)
{
     cout<< ctr++ <<"\n";
}

</span><span>
</span><span>
</span><span>HOPE i HELPED! brainliest? :D </span></span>
You might be interested in
1.How does inertia affect a person who is not wearing a seatbelt during a collision?
KIM [24]
1. during a collision, the person not wearing a seatbelt is already in motion. there is no outside force (the seatbelt) to stop this motion. 
2. Kinetic Energy = 0.5 * m * v^2  because velocity is a squared term, doubling the velocity actually quadruples the kinetic energy, making the stopping distance much much greater
3. by the same logic as above, mass is not a squared term, therefore doubling the mass will double the kinetic energy, increasing the stopping distance -- but by not as much as increasing the velocity.
4. because a driver cannot alter the mass of his vehicle, the best way to enter sharp curves would be decreasing velocity (speed)
5. there are many factors that determine the degree of damage (to humans and property in a crash), most notably the size of the vehicle(s) and velocity.
6 0
3 years ago
open your browser and enter the address of this ftp site in the address box: ftp.cengage. if your browser supports ftp, a logon
Licemer1 [7]

FTP access is available from other companies, but access is constrained unless the user first authenticates by supplying a user name and potentially a password.

The files are frequently intended for specific uses rather than for public release. For instance, you must send a letter house your consumer address list. Both businesses would not want the public to have access to these materials in this situation. Software is a collection of instructions, data, or computer programs that are used to run machines and carry out particular activities. It is the antithesis of hardware, which refers to a computer's external components. A device's running programs, scripts, and applications are collectively referred to as "software" in this context. Software refers to the processes and programs that enable a computer or other electrical device to function.

Learn more about software here-

brainly.com/question/985406

#SPJ4

7 0
1 year ago
When a communication exchange that does not verify the identity of the endpoints of a communication and accepts any properly for
ELEN [110]

Answer:

True

Explanation:

When communication exchange that does not verify the identity of endpoints of communication is true

3 0
3 years ago
True or False, In adversarial searching, agents using the MiniMax algorithm always select the state that has the highest guarant
kogti [31]

Answer:

True

Explanation:

The MiniMax algorithm computes the MiniMax decision from the current state. The MiniMax algorithm always is especially known for its usefulness in calculating the best move in two-player games where all the information is available

6 0
2 years ago
Which member of the restaurant and food/beverage service career is mostly likely to plan menus and direct worker
kumpel [21]

What are the options for the question

5 0
3 years ago
Read 2 more answers
Other questions:
  • Is anyone familiar in drawing flow charts for c++ programming
    14·1 answer
  • The syntax for multiplication function is ____________.
    8·1 answer
  • Which of the following is used to describe an authentication scenario in which a user logs in using a PIN and a security token
    7·2 answers
  • How Oracle 12c advances the security discussion?
    12·1 answer
  • What term refers to the text label that describes each data series?
    9·1 answer
  • Fill in the blank: _________ is Google’s machine-learning artificial intelligence system that interprets people’s searches to fi
    9·1 answer
  • What are the tyoe of typical application of mainframe computer<br>​
    6·1 answer
  • Write a function called prod_all that takes any number of arguments and returns their sum. Test the function by using these two
    10·1 answer
  • Explain the characteristics of a first generation computer​
    8·1 answer
  • Wha are the types of slide show? define​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!