1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Thepotemich [5.8K]
3 years ago
11

Edhesive 6.1 Code Practice

Computers and Technology
2 answers:
Mariulka [41]3 years ago
6 0

What kind of question is this?

Katyanochek1 [597]3 years ago
5 0

Answer:

Explanation:

I could find an Introduction to Computer Science  course online about this question, in this course, in unit 6 and the first lesson is about LOOP.

Loop in programming is a cycle, we can use a cycle for and cycle while, this depends on our needs.

For example:

We could need an increase 1 by 1 in a number, we're going to do an example in the language java.

In this case, we have the variable "i" equal to 0, this variable going to increase with this code "++i" 1 by 1, with the condition i < 5, If the variables i is less than 5 then increase variable, until "i" be equal to 5, we print the result with the line System.out.println(i);  

would be:

0

1

2

3

4

Until 4 because the condition is always less than 5, we cannot print 5 because is equal to 5

for (int i = 0; i < 5; ++i) {

   System.out.println(i);

}

You might be interested in
Write an expression that executes the loop body as long as the user enters a non-negative number.Note: If the submitted code has
Eva8 [605]

Answer:

See attached picture.

Explanation:

See attached picture for explanation.

5 0
3 years ago
What happens as the key length increases in an encryption application?
pashok25 [27]
<span>The answer is : Increasing the key length of DES would  protect it against brute force attacks.  </span>Brute force is when the attacker tries every key knowing that one will eventually work.  <span>Key length increase proportionally increases the key space,  having a keyspace l</span>arge enough that it takes too much time and money to accomplish a brute force attack.
6 0
3 years ago
Explain the components of Information System?​
slavikrds [6]

Answer:

An information system is essentially made up of five components hardware, software, database, network and people. These five components integrate to perform input, process, output, feedback and control. Hardware consists of input/output device, processor, operating system and media devices.

Explanation:

7 0
3 years ago
8.10 quiz edhesive A swap is: a variable used to find the smallest value in an array an algorithm used to find a value in an arr
zmey [24]

Answer:

A swap is: an algorithm exchanging two values stored in variables

Explanation:

I just did it and got it right

8 0
2 years ago
The block of code below is supposed to display “multiple of 5” if the positive number value is in fact a multiple of 5
12345 [234]

Answer:

Answer is (value MOD 5) = 0.

Explanation:

A number A is multiple of another number B  if after dividing A by B remainder value is zero.

In mathematics modulo or (MOD) function is a function which returns remainder value after dividing two numbers.

Here in question for condition

( value MOD 5 ) = 0 code will print "Multiple of 5". For each value which is divisible by 5 we will get zero remainder implying that value is a multiple of 5.

3 0
3 years ago
Other questions:
  • 13. You're expecting an important call from Mr. Suarez, a potential customer. While waiting for this call, your supervisor calls
    15·1 answer
  • Software that was designed to serve the needs of a specific company or organization is called:
    5·1 answer
  • Alison wants to add her company name at the bottom of every page in her document. Which option should she use?
    11·2 answers
  • Among the rights you have as a user of computing resources is the right to​ _______.
    12·2 answers
  • 2. What is data redundancy?
    14·1 answer
  • What command would you use to add a file to an e-mail message?
    15·2 answers
  • For the recursive method below, list the base case and the recursive statement, then show your work for solving a call to the re
    8·1 answer
  • What will be the range of the random numbers generated by the following code snippet? rand() % 50 + 5;
    14·1 answer
  • Ha Yoon sees funny quotes on top of images frequently in her social media feed. One day, she has an idea for one of her own. Whi
    11·1 answer
  • Only need help on f and correct me if im wrong for the other questions please
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!