1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seropon [69]
3 years ago
9

Given an int variable n that has already been declared and initialized to a positive value, and another int variable j that has

already been declared, use a while loop to print a single line consisting of n asterisks. Thus if n contains 5, five asterisks will be printed. Use no variables other than n and j.
Computers and Technology
1 answer:
Svet_ta [14]3 years ago
6 0

Answer:

easy

Explanation:

............................

You might be interested in
*explain why computer literacy is vital to access in today’s business work
kkurt [141]

Answer:

Computer literacy is vital to access in today’s business work because of advanced technology which ensured that most companies run a computerized system as against the manual one which was existent in the past.

The use of computerized system enables work to be done faster and in a more accurate manner which is why bring a computer literate is widely embraced in the world today.

8 0
3 years ago
____________ is using digital media safely, responsibly, and ethically.
Ronch [10]

I think it may digital citizenship

8 0
4 years ago
Read 2 more answers
If a class's only constructor requires an argument, you must provide an argument for every ____ of the class that you create.1.
Naddik [55]

Answer:

The answer is "Option 1"

Explanation:

In oops(object-oriented programming language) an object is an example of a specific class or subclass with methods or processes of the class itself and variables for data. When we create an object of the class the default constructor is automatically executed. and other options are not correct that an be described as follows:

  • In option 2, Type is used in data type. It is an attribute, that tells the user or programmer what kind of data value they store. for example string, numeric, and floating-point value.
  • In option 3, Parameter is used in the method for passing a value in function and calculate some values.
  • In option 4, A method is also known as a procedure, that associate with a message and an object.

8 0
3 years ago
define and discuss the following network protocols: TCP, UDP, IP, and ICMP. Include the differences between TCP & UDP and IP
Vanyuwa [196]

Answer:

 The following types of network protocols are explained below as:

TCP:  TCP stand for the transmission control protocol and it is used for the interconnect various types of network devices on internet. The TCP is the type of protocol that is used for communication in the particular private network and it is also known as intranet.  

UDP: UDP stand for the use data gram protocol and it is the simplest and the connection less protocol. On the other hand, TCP is the connection oriented internet protocol. By using the UDP, we can easily sent multiple message in the form of packets.

IP: IP stand for the Internet protocol and it is used as the internet address protocol for assigning the connection between the each device in the network. The main function of the IP is that it used for locating the address in the system.  

ICMP: ICMP stand for the internet control message protocol and it is the main integral part of the IP. The ICMP is the error detecting internet protocol in the network devices. It is one of the important networking security in the system.

6 0
3 years ago
By applying styles formats are being applied ?
Dovator [93]

Answer:

A

Explanation:

The same formats are being applied.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Keisha wants to change the font color on the 1st and 3rd bullet items on slide 6 of her allied health presentation. what is the
    14·1 answer
  • For homework, we were given this photo and to figure out what it is. It is up close and labelled “ too close to tell” but I have
    7·1 answer
  • Describe business benefits of using wireless electricity?
    6·1 answer
  • The ________ contains the central electronic components of the computer. select one:
    14·1 answer
  • A wall is built of bricks. What force is being applied to each brick from the bricks above? ​
    7·1 answer
  • The human brain can store both temporary and permanent bits of information. Which type of memory in the computer is similar to t
    6·1 answer
  • What is another name for an unmanaged switch?
    12·1 answer
  • Customizing ads to people who had earlier visited the site is
    14·1 answer
  • The gene form of a trait is called a(n) ​
    10·1 answer
  • Which of these are correctly formatted Python tuples? CHECK ALL THAT APPY.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!