1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
azamat
3 years ago
14

This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.

Computers and Technology
2 answers:
KatRina [158]3 years ago
5 0
Infinite means not stop. Something that keeps going and going! So the answer would have to be 4 :)
Papessa [141]3 years ago
4 0

Answer:

This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.: for - 3.

You might be interested in
A--------- provides an easy way to enter or display a record​
kolbaska11 [484]

Answer:

41

Explanation:

7 0
2 years ago
Read 2 more answers
Can you explain the difference between software and hardware? Tell me 3 examples of each one.
solniwko [45]

Answer:

Hardware like a CPU computes the things like a painting software but the painting software is just a platform to draw things as it doesn't have any purpose without the hardware as it can't be ran. A GPU is a gaming processing unit to process the 3D Environment or a 2D Game Or to render 3d objects.

Explanation:

5 0
2 years ago
security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
daser333 [38]

Organization must notify the DPA and individuals

<h3>What was the typical weakness that outside attackers exploited?</h3>

One frequent flaw in network security that some attackers have learnt to take advantage of is the propensity of some web browsers, like Safari, to launch "safe" or "trusted" scripts automatically. Threat detection is the process of scrutinizing a security ecosystem from top to bottom to find any malicious behavior that could jeopardize the network. If a threat is identified, mitigating measures must be taken to effectively neutralize it before it can take advantage of any existing vulnerabilities. It's critical to often scan because security professionals and hackers frequently discover new vulnerabilities, like Log4Shell. Therefore, scanning for and identifying security vulnerabilities is the initial step in the vulnerability remedy procedure.

To learn more about outside attackers refer to

brainly.com/question/17329931

#SPJ4

3 0
11 months ago
What is cyber stalking and how does it work?
Tcecarenko [31]
Cyber stalking is when someone stalks them on social media sites like facebook. They try to contact you or will even try to find you.
6 0
3 years ago
Read 2 more answers
The top-down approach is an appropriate strategy for most
puteri [66]

Answer:

true

Explanation:

The Top-down approach is an approach to a problem that focuses on the big picture first before moving down into the specifics of the topic/problem. Therefore based on the information provided within the question it can be said that the statement being made is completely true. Since the interviewer using this approach starts with a broad topic and later goes into the details, it does allow them to be accustomed to the topic first.

8 0
3 years ago
Other questions:
  • Helena purchased a security software package to protect her new laptop against threats such as spyware and computer viruses. she
    14·1 answer
  • In a ring-based system, procedure p is executing and needs to invoke procedure q. Procedure q's access bracket is (5,6,9). In wh
    15·2 answers
  • Claudia has a bachelors degree in computer information systems and she has learned to use some popular software testing tolls wh
    13·2 answers
  • When a partition is formatted with a file system and assigned a drive letter it is called a volume?
    10·1 answer
  • What is technology?
    11·1 answer
  • Vannevar Bush imagined a desktop computing machine that would allow people to access data stored in various information centers
    13·1 answer
  • The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a select
    7·2 answers
  • Assignment 6: Animation
    7·1 answer
  • How to change the microsoft word pages to black background
    8·1 answer
  • This is an image of the ...........................Topology.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!