1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ddd [48]
2 years ago
8

Given an int variable n that has already been declared and initialized to a positive value , and another int variable j that has

already been declared , use a while loop to print a single line consisting of n asterisks. thus if n contains 5, five asterisks will be printed. use no variables other than n and j.
Computers and Technology
1 answer:
Ugo [173]2 years ago
8 0
While( n )  /*when n == 0, will fail*/
{
   putchar( '*' );  /*effectively print asterick*/
   n--;    /*post-decrement n*/
}
You might be interested in
Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
tiny-mole [99]

Answer:

a. social engineering attack

Explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.

6 0
3 years ago
In 1997, two South Korean manufacturers of semiconductors, LG Semicon and Hyundai Electronics, were accused of selling dynamic r
KatRina [158]

Answer:

<em>d. dumping.</em>

Explanation:

In international trade, dumping is described loosely as <em>selling products on  a foreign market below their manufacturing expenses or selling products on  a foreign market below their ' reasonable ' market value</em>.

It is a form of injury pricing, a difference in cost aimed at harming the competition.

4 0
3 years ago
6.- Escribe un ejemplo donde se utilice un sistema de información
lesya [120]

Answer:

<h3>Examples of information systems. Quality control systems. They are those in which there is customer feedback and the results are evaluated under statistics and final reports. The databases in a library. To organize and store file databases such as books, journals. journals, theses, etc.</h3>

Explanation:

8 0
2 years ago
The best way to help people in the contemplation stage of change is to:
Lelechka [254]

Answer:

D. Point out the negative consequences of the behavior, so they see that the negative aspects do outweigh the positive aspects​

Explanation:

7 0
2 years ago
Read 2 more answers
What is a text feature that could add visual interest and clarity to a procedural document?
rjkz [21]

Bullet points is another

3 0
2 years ago
Read 2 more answers
Other questions:
  • Match the spreadsheet features with their respective descriptions.
    7·2 answers
  • What does it mean when system ui has stopped?
    9·1 answer
  • What is a unit to measure loudness
    15·1 answer
  • Does anyone know a good reason WHY to change your username.
    5·1 answer
  • Worksheet Identify the devices for moving the cursor around your computer screen
    12·1 answer
  • Which branch of science helps avoid or minimize stress-related injuries at workplace?
    14·1 answer
  • What is a cookie? *
    9·2 answers
  • You are developing a Website that is going to be viewed extensively on smartphones and tablets. Which of the following should yo
    7·1 answer
  • Remember not to use tools that are ________ in any way.
    5·1 answer
  • imagine that you wanted to write a program that asks the user to enter in 5 grade values. the user may or may not enter valid gr
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!