1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seropon [69]
3 years ago
9

Given an int variable n that has already been declared and initialized to a positive value, and another int variable j that has

already been declared, use a while loop to print a single line consisting of n asterisks. Thus if n contains 5, five asterisks will be printed. Use no variables other than n and j.
Computers and Technology
1 answer:
Svet_ta [14]3 years ago
6 0

Answer:

easy

Explanation:

............................

You might be interested in
Which application software would be most suitable for writing a resume?
Gemiola [76]

Answer:

Either word or I would suggest using google docs and word and compare.

Explanation:

You can set up a resume in word.

7 0
3 years ago
The rangevalidator object on a web form has a type property for identifying the type of data for the range, such as ____.​
mojhsa [17]
<span>numbers,  dates, currency or strings - The range validator in a web form helps check whether the value entered in the field falls between the minimum and maximum values allowed in that field. For example if the type of data accepted  is of date type, then the rangevalidator checks whether the entered date falls within the given range. That means, month entered should be between 1 and 12, etc.</span>
8 0
3 years ago
.An algorithm specifies the actions to be executed.<br><br> True<br><br> False
steposvetlana [31]

Answer:

True.

Explanation:

An algorithm for a problem provides the set of instructions that are required to solve a problem.It does not provide the full code.It is like an abstract solution of a problem.It is just like a recipe for cooking a dish.It will not cook food for you but can tell you how to cook.

Since it provides the action to be executed hence the answer is True.

3 0
3 years ago
_____________is the act of protecting information and the systems that store and process it.A.Information systems securityB.Poli
mylen [45]

Answer:

A. Information System Security (ISS)

Explanation:

Information System security is a very important security in any organization.

The main focus of Information system security is the system itself and the information that the system possesses, processes and stores.

Information system security, or infosec for short, is the modality involved in protecting information and in making it available.

With Infosec,

1. an organization's ability to perform is protected

2. the data an organization uses is protected ensuring integrity

3. programs, applications and technology implemented on an organization's systems are safely used.

Hope this helps!

3 0
3 years ago
Read 2 more answers
What evaluates variables that search engines use to determine where a URL appears on the list of search results?
RSB [31]

Answer:

The correct answer is "Search engine ranking".  

Explanation:

The search engine is also known as an Internet search engine that is developed for searching the website or the web. The search engine is a type of software system. When we search anything into the web there are so many website or related links are appeared the Search engine ranking means on searching on the top which is appeared or which appeared in bottom simply it gives the position of the searching web.

The main objective of the Search engine ranking to determine where a URL appears on the list on searching into the web.

6 0
3 years ago
Other questions:
  • Which of the following represents inbound logistics for a bookstore
    13·1 answer
  • FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this i
    7·2 answers
  • 350 square feet requires 1 gallon of paint. Assign gallons_paint with the amount of paint required for wall_area. Sample output
    12·1 answer
  • John was carrying on at the water cooler the other day, trying to show off his knowledge of networking. He claimed that the comp
    10·1 answer
  • (Display four patterns using loops) Ask the user to enter an integer to
    8·1 answer
  • Review universal data models and discuss how these are being used more widely today. Does a data modeling project using a packag
    9·2 answers
  • When engineers consider _____, they propose giving up a benefit of one proposed design in order to obtain a benefit of a differe
    14·1 answer
  • Please help I really need it :(
    12·1 answer
  • Which steps are needed for word to create an index
    5·1 answer
  • you have been using snmp on your network for monitoring and management. you are concerned about the security of this configurati
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!