1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kisachek [45]
2 years ago
6

Identify examples of loop structures using comments in your code. Be sure your examples address each of the following: i. Item-b

ased for loops ii. Index-based (range) for loops ii. While loops
Computers and Technology
1 answer:
Alex73 [517]2 years ago
4 0

Answer:

item based for loop is used to iterate items in a collection .it is useful to apply some operations on item. Index based for loop is used to execute some logic repetitively. While loop also useful to execute a logic repetitively

Explanation:

item based for loop is used to iterate items in a collection .it is useful to apply some operations on item. Index based for loop is used to execute some logic repetitively. While loop also useful to execute a logic repetitively

in c#.net , following example explains this

using system;

void main(){

String[] names=new  names[20];

int counter=0;

//index based for loop

for(int i=0;i<20;i++){

console.read(names[i]);

}

//item based for loop

foreach(string s in names){

console.writeline(s);

}

//while loop

while(counter<20)

{

console.read(names[counter];

counter++;

}

}

You might be interested in
Compare and contrast the following network types: Personal Area Network (PAN) Local Area Network (LAN) Metropolitan Area Network
Dominik [7]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

The various forms of networks and their contrast are as follows:

<u>LAN</u>

This is another form of connection that links the machine and system community together in such a limited but wider range than those of the PAN network. LAN will attach the two as well as three surrounding buildings for shared folders including assets as well as knowledge exchange.

<u>MAN</u>

MANs represent networks or channels that are broader than LANs although smaller than WANs since they cover the whole metropolitan area which might be a city rather than a county.

<u>WAN</u>

WANs seems to be the channel's biggest and wider than MANs, allowing machines to connect and communicate to one another and miles away, and it can also link all machines across the globe to either the Internet as well as network access.

<u>WLAN</u>

Wireless LAN is used to link connections in such a LAN network using Wi-Fi wireless innovations. The positive point here is really that we don't have to manually interact via cables in WLAN, and instead promote flexibility including networking for portable devices.

7 0
3 years ago
What process describes using technology as a basis for controlling the access and usage of sensitive data?
Ipatiy [6.2K]

Answer:

Technical controls.

Explanation:

In a network, data is transmitted in form of packets and frames within a network or between networks. Users with authorised access to a network and a end device can easily access its services with the required tools.

Cyber attackers exploit vulnerabilities in networks to access information and services. For this technical control means are implemented. It uses technology as a mean of controlling access to networks and information.

Technologies like firewall, intrusion detection and prevention devices, antivirus and encryption are examples of technical control mechanism for access control.

6 0
3 years ago
after placing her insertion point after grandma's kitchen, order the steps Danica needs to follow to insert and format the regis
KengaRu [80]

Answer:

step 4

step 5

step 3

step 2

Explanation:

8 0
3 years ago
Read 2 more answers
EIPP:________.
nikdorinn [45]

Answer:

D. All of these choices are correct

Explanation:

Electronic invoice presentment and payment, otherwise known as EIPP are business-to-business systems that combine e-invoicing and e-payment processes for the purpose of sending invoices to customers via Web portal or via a secure network by the use of a third party service provider. They are also used for receiving payer-initiated, third-party-processed, and ACH-network-settled wire transfers.

4 0
3 years ago
Read 2 more answers
56- What is the term used when you press and hold the left mouse key and more the mouse
elena55 [62]

Answer:

i'd say it's dragging, but i'm not 100% sure

Explanation:

8 0
2 years ago
Other questions:
  • Anti-bullying laws in most states are designed to provide
    14·2 answers
  • Write a function addOne that adds 1 to its integer referenceparameter. The function returns nothing.
    11·1 answer
  • What group in the review tab contains the commands and to accept or reject changes made to a document
    14·2 answers
  • The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a ________.
    7·1 answer
  • Which item is used for formatting in responsive web design?
    14·2 answers
  • Who has gotten a random file link from someone? What file does it contain?
    8·2 answers
  • In series connection, if we have two symmetric devices connected with 10 V battery, voltage for each device will be.. .5V or 10V
    10·1 answer
  • In what ways is the human brain like a computer? In what ways is it different?
    14·2 answers
  • state an application that would be better to write c++ than java and give a rationale for your answer
    5·1 answer
  • WILL GIVE BRAILIEST
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!