1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Papessa [141]
3 years ago
8

Counter-controlled repetition is also known as:

Computers and Technology
1 answer:
const2013 [10]3 years ago
3 0

Answer:

a) definite repetition

Explanation:

The counter-controlled repetitions is one in which we know the number of times a loop will be followed or performed.

Definite repetition is the one in which we know the number of iterations to be performed by a loop before the execution of the loop.  

For Example:  

Repeat a loop for 25 times printing out b *.

You might be interested in
An alteration threat violates information integrity. <br> a. True <br> b. False
Art [367]
The answer is True


It intentionally or unintentionally compromises a system by making unauthorized changes to data. As compared to intentional changes which are usually malicious, unintentional changes are normally accidental. Changes and modifications to the system configurations can also compromise integrity. Such modifications might include deleting, changing, and creating information in a network resource. It is best to implement mechanisms on how one can track and audit such changes as they happen




6 0
3 years ago
Select all correct statements below: Group of answer choices A redundant link's switch port will be blocked by STP until needed.
GenaCL600 [577]
Snhahshshshshshhshshshsshhshshshshhs
5 0
3 years ago
The systems development life cycle (SDLC) is the overall process of developing, implementing, and retiring information systems t
MissTica

Answer:

the system development life cycle (SDLC) is the overall process of developing, implementing, and retiring information systems through a multistep process—initiation, analysis, design, implementation, and <u>maintenance to disposal.</u>

Explanation:

There are several  SDLC models and each generally consists of a numbers of definite stages. For a given adopted SDLC model, information security and product services must be integrated in to the SDLC to ensure appropriate protection for the information that the system will transmit, process, and store.

8 0
3 years ago
The _____ contains a series of sections designed to prepare students for the ACT
Studentka2010 [4]
The answer is aspire test 
3 0
3 years ago
Read 2 more answers
6.Decreasing a telescope's eyepiece focal length will:
Ghella [55]
B is the correct answer to ur questions
8 0
3 years ago
Other questions:
  • The concept of plug and play" is demonstrated by which of the following
    15·1 answer
  • Implement the function pairSum that takes as parameters a list of distinct integers and a target value n and prints the indices
    11·1 answer
  • Before the electronic era information was usually directly communicated and not recorded, much of the information you received w
    9·1 answer
  • What does this result prove about the computer’s network connectivity?
    12·1 answer
  • In C++ Please :
    6·1 answer
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    12·1 answer
  • Discuss the difference between a broad internet search and a narrow internet search?
    12·2 answers
  • What is a Software that interprets commands drom the keyboard and mouse
    13·1 answer
  • Which of the following types of computers is typically used by governments and hospitals and can support hundreds of users?
    6·2 answers
  • What is first page of website called​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!