1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lukranit [14]
3 years ago
8

Please check my answer! (Java)

Computers and Technology
1 answer:
Nat2105 [25]3 years ago
8 0

9 is the correct answer. 4*2=8 loops are executed, moving the count from 1 to 9.

You might be interested in
A _________ attack is an attack on a computer system or network that causes a loss of service to users.
Svetlanka [38]

Answer: Denial of Service

Explanation:

the term is self-explanatory

7 0
3 years ago
why are microphones or digital cameras unlikely to cause the damage that is found in repetitive strain injury?
sveta [45]
Because these devices do not require the repetitive motion that cause the damages.
5 0
3 years ago
What finger is used to key letter c
kumpel [21]

Answer:

your pointer finger

sorry if this is wrong

Explanation:

8 0
3 years ago
Read 2 more answers
how can people access to a range of online services affect their ability to operate safely in the digital world
Andru [333]
Have parental controls on certain sites
3 0
3 years ago
What is the difference between images and pictures
julia-pushkina [17]
An image is a representation of a person or thing but a picture is a painting or drawing
6 0
3 years ago
Other questions:
  • Though it is seen as a last resort bankruptcy allows a consumer to
    6·1 answer
  • Charts are inserted into an excel spreadsheet using the commands in the charts group on the ____ tab on the ribbon.
    13·1 answer
  • Which type of address is used at the transport layer to identify the receiving application?
    14·1 answer
  • Based upon the contents of the BOOKS table, which line of the following SQL statement contains an error?
    13·1 answer
  • To which built-in object does the function sin(x) belong?
    12·1 answer
  • The following pseudocode is an example of ____.do stepAdo stepBif conditionC is true thendo stepDelsedo stepEendifwhile conditio
    15·1 answer
  • In terms of Technology software is defined as?
    11·2 answers
  • Give an example of an expression that has three terms. The first term should have two factors, the second term should have three
    14·1 answer
  • Who likes my meme? :)
    9·2 answers
  • 8. Software ____ are individual programs that can be purchased, installed, and run separately, but extract data from the common
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!