1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
boyakko [2]
3 years ago
8

Which register is known as a loop counter? a. EAX b. EBX c. ECX d. EDX

Computers and Technology
1 answer:
Roman55 [17]3 years ago
7 0

Answer: ECX

Explanation:

The loop counter is simply used to know when a particular loop should be ended and also for the continuation of the program flow after the loop to the next instruction.

The EAX is an accumulator register, the

EBX is a base register, the EDX is a data register while the ECX is simply a counter register that is typically used as loop counter.

You might be interested in
Your computer sign-in screen is visible, but after you enter your sign-in credentials the computer fails to sign in and present
Step2247 [10]

Answer:

Shift key.

Explanation:

6 0
3 years ago
Write code to complete doublePennies()'s base case. Sample output for below program with inputs 1 and 10: Number of pennies afte
UkoKoshka [18]

Answer:

public class CalculatePennies {

// Returns number of pennies if pennies are doubled numDays times

  public static long doublePennies(long numPennies, int numDays) {

     long totalPennies = 0;

     /* Your solution goes here */

     if(numDays == 0){

         totalPennies = numPennies;

     }

     else {

        totalPennies = doublePennies((numPennies * 2), numDays - 1);

     }

     return totalPennies;

  }

// Program computes pennies if you have 1 penny today,

// 2 pennies after one day, 4 after two days, and so on

  public static void main (String [] args) {

     long startingPennies = 0;

     int userDays = 0;

     startingPennies = 1;

     userDays = 10;

     System.out.println("Number of pennies after " + userDays + " days: "

          + doublePennies(startingPennies, userDays));

     return;

  }

}

Explanation:

8 0
3 years ago
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound
defon

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

4 0
4 years ago
How is an image represented
Sonja [21]
With a sertain address.
4 0
3 years ago
Read 2 more answers
A firm is assigned the network part 133.44. It selects an 12-bit subnet part. Note that this is not on an octet (8-bit boundary)
Andreas93 [3]

Answer:

Hello the options to your question are missing here are the options

a. 1022

b. 62

c .14

d. None of the above

Answer : None of the above ( d )

Explanation:

A firm is assigned the network part 133.44. It selects an 12-bit subnet part.  The number of  hosts  possible are

= 2^{12}   - 2

= 4094

Note : Subnetting is a technique that lets network administrators use the 32 bits available but  the actual host ID portion of the subnetted address is 12 bits in length.

5 0
4 years ago
Other questions:
  • Which of the following is another name for cinematographers? (Select all that apply). lighting specialists production manager di
    8·1 answer
  • Two electronics technicians are looking at the representations of a silver atom and a copper atom in the figure above. Technicia
    10·1 answer
  • Computers store temporary Internet files in the Recycle Bin. These files take up space and slow down a computer. Which tool can
    10·1 answer
  • Write a program that uses these bounds and bisection search (for more info check out the Wikipedia page on bisection search) to
    8·1 answer
  • What is the purpose of an internet protocol address (ip address)? it specifies whether a computer is using a broadband network o
    10·1 answer
  • Which of the following is not a concern that has come out of the widespread adoption of the Internet?
    7·1 answer
  • Describe two circumstances where access services might get implemented by organizations please.​
    9·1 answer
  • D. What is the work of the following features:<br>1. Foot note​
    10·1 answer
  • WILL GIVE BRAINLEIST PLZ HELP PLZ AND THANK YOU
    7·1 answer
  • Choose the best answer from the options below to complete the following sentence.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!