1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lina2011 [118]
3 years ago
11

In Java, it is possible to create an infinite loop out of while and do loops, but not for-loops. true or false

Computers and Technology
1 answer:
soldier1979 [14.2K]3 years ago
8 0

Answer:

False is the correct answer for the above question.

Explanation:

  • In java programming language or any other programming language, any loop can be infinite.
  • It is because the infinite loop is called for that loop which is not run in a finite number of times.
  • The loop is used to repeat some lines in a finite number of times. Any loop has three things- first is the initial value which tells the loop to start, The second is the condition check which states when the loop will stop and the third is an operation which directs some variable, so that the condition may be false after some finite amount of time.
  • If the condition will not false in any iteration of the loop, then the loop can proceed for an infinite amount of time.
  • The above-question states that the while loop and do while loop can be infinite which is a true statement.
  • But it also states that the 'for' loop can not be infinite which is not a correct statement which is described above. Hence false is the correct answer to the above question.
You might be interested in
Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identi
kvasek [131]

Answer:

B. Intrusion Detection Software (IDS)

Explanation:

An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS  product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.

3 0
3 years ago
Select the correct answer. Marie uses a browser to visit a blog. How is the blog uniquely identified? A. web page B. website C.
damaskus [11]

Answer:

I belive the answer is E

Explanation:

8 0
2 years ago
SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without es
Mashutka [201]

Answer:

A closed port that can not receive request from authorized users.

Explanation:

Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.

Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.

DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.

8 0
3 years ago
Why it's important for designers to consider the environmental impact of a<br> product they design.
Aloiza [94]

Answer:

Kindly check explanation

Explanation:

The environment is our abode which aids the continued survival and growth of plant, animals and humans. The most important components and natural resources which are neceaaaarybto dwell and survive are all waht a makes up an enviromment. The energy derived from the sun aids power generation, plant growthbduring photosynthetic activities which is rewired to produce crops and feed us. The air we breathe are all a part of our enviromment. Therefore, such environment which provides a canvas or platform for our existence must be greatly cared for and no technological innovation, project or design must be allowed to impact negatively on the enviromment. Thus the need for impact assessment of systems in other to ensure that our abode isn't threatened.

4 0
2 years ago
Most of us have been using elements of Web 2.0 without even realizing it.<br> True<br> False
aleksandrvk [35]

Answer: True?

Explanation:

I’m pretty sure I’m new to that stuff

5 0
2 years ago
Other questions:
  •                                                        HELP PLEASE 
    12·2 answers
  • Your laptop doesn't have a serial port. what type of connector will your laptop require
    6·1 answer
  • Write a function named get_my_age that returns your age as an int (this is YOUR age, so if you were 21 you would return the numb
    11·1 answer
  • I’m nobody. Who are you?
    9·2 answers
  • Service that connects on-premises software appliances with cloud based storage is ______
    10·1 answer
  • Mihaela I. Croitoru – Utilizarea calculatorului personal Microsoft Word dau coroana
    14·1 answer
  • Hey guys im just curious.... whats ur favorite number
    6·2 answers
  • Suzanne is following a fad diet. She has started to experience low energy during her workouts, and on a recent trip to the docto
    10·2 answers
  • How do you make a minecraft server. just the basics please. I only need ine for me and my friends.
    7·2 answers
  • A statement that starts with a # symbol is called
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!