1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
azamat
4 years ago
14

This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.

Computers and Technology
2 answers:
KatRina [158]4 years ago
5 0
Infinite means not stop. Something that keeps going and going! So the answer would have to be 4 :)
Papessa [141]4 years ago
4 0

Answer:

This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.: for - 3.

You might be interested in
A type of address translation in which a gateway has a pool of public ip addresses that it is free to assign to a local host whe
krok68 [10]
<span>Dynamic Network Address Translation (DNAT)</span>
7 0
3 years ago
A(n) ________ software installation copies all the most commonly used files to your computer's hard drive.
irinina [24]

Answer:

Full

Explanation:

According to my research on IT tasks, I can say that based on the information provided within the question this type of software installation is called a Full Software Installation. This type of installation is usually done when installing a brand new operating system, which you then need to install all the necessary software that is commonly needed.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
Which term is used to describe a public-key, cryptography-based mechanism for proving the source (and possibly integrity) of a d
Olegator [25]

The question below has multiple answers

<span>a)      </span>Trusted third party

<span> <span>b)      </span>Symmetric Cryptography <span> <span>c)       </span>Algorithm <span> <span>d)      </span>Digital signature The answer is (D) Digital Signature It uses the private key of a sender and is a mathematical technique that validates the integrity and authenticity through a public key encryption of a digital or a software document. It is normally attached to digital or a software document to verify the sender’s identity and its content. </span></span></span>




5 0
3 years ago
Read 2 more answers
There are 10 girls and 8 boys at a party. A cartoonist want to sketch a picture of each boy with each girl. How many sketches ar
kykrilka [37]
80 sketches will be required. It’s just multiplication. Let x=boys and y=girls. If x=8 and y=10, then one boy has to be with one girl. In total 1 boy will be with 10 girls, so that’s 10 sketches. You do the same for boy #2 and so on. It adds up to 80.
3 0
3 years ago
What are the arguments for writing efficient programs even though hardware is relatively inexpensive?
Ainat [17]

Answer: Even though the hardware is inexpensive the writing of program is not efficient through this method as proper development of program is necessary for the clear execution due to factors like:-

  • The facility of writing program even the cost of hardware is less but it is not a free facility.
  • It also has a slower processing for the execution of the program
  • The construction of the efficient program is necessary for the compilation and execution of it rather than poorly constructed program is worthless and inefficient in working.

7 0
3 years ago
Other questions:
  • Select the correct answer. Andy wants to become a multimedia producer. Which degree can help him achieve this goal? A. bachelor’
    5·1 answer
  • The distance at which wi-fi signals can travel ranges typically between ____ and ____.
    15·1 answer
  • Which of the following tasks would you most likely use a spreadsheet to complete
    15·1 answer
  • Which step is common to both creating a new document and saving a document?
    11·2 answers
  • Mark is the network administrator in his building and is responsible for training all the new technicians on various troubleshoo
    7·1 answer
  • 1 Which of these is not an Operating System ?
    7·2 answers
  • Power point programm<br><br>​
    11·1 answer
  • 2. What is the first part of the 3D printing process ?
    11·1 answer
  • Radio spectrum is the part of the complete range of electromagnetic waves that is used for radio communication from
    14·1 answer
  • Does anyone know the answer
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!