1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariulka [41]
3 years ago
12

What is a counter-driven loop?

Computers and Technology
1 answer:
valentinak56 [21]3 years ago
7 0

Answer:

A counter driven loop or counting loop is a loop that help in keeping the count of the values from initial to the greater level sequentially. The counting is done by the component known as the loop control variable ,that is the integer value.

The counter- driven loop should represent the features like initialization of the counter, increasing it accordingly and loop should get stopped at the accurate count.

You might be interested in
The answer for this question?
Debora [2.8K]
It will flow from 2 to 1
6 0
3 years ago
1. Why was the Internet created?
lana [24]

Answer:

1. The internet is any set of computer network that communicates using standardized protocols.The Internet was first invented for military purposes, and then expanded to the purpose of communication among scientists

2.ARPANET was the network that became the basis for the Internet. Based on a concept first published in 1967, ARPANET was developed under the direction of the U.S. Advanced Research Projects Agency (ARPA). In 1969, the idea became a modest reality with the interconnection of four university computers.

3.The first permanent ARPANET link was established on 21 November 1969, between the IMP at UCLA and the IMP at the Stanford Research Institute.

4. Vinton Grey Cerf born june 23rd 1943 in New Haven Connecticut is considered to be the father of internet.

5.Mosaic is a converged platform, which offers data engineering, advanced analytics, knowledge-led automation, IoT connectivity and improved solution experience to its users. Mosaic enables organizations to undertake quantum leaps in business transformation, and brings an insights-driven approach to decision-making. It helps deliver pioneering Analytics solutions at the intersection of physical and digital worlds.

6. client/server network. A computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. The clients run programs and access data that are stored on the server

7.An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: host or network interface identification and location addressing.

8.A Vlog is is a video blog post. You can think of it as an online journal or diary, while A blog is purely text based.

9. The main difference between podcast and webcast is live streaming. Webcasting is essentially broadcasting over the Internet, using online streaming to deliver content. Podcasts are delivered via the Internet but are not streamed.

10.Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people. Email should be used because it safe and secure.

11. Some of the email etiquette are: Do have a clear subject line. Don't forget your signature.Do use a professional salutation. Don't use humor. Do proofread your message. Don't assume the recipient knows what you are talking about..Do reply to all emails.

12.Text messaging, or simply "texting," is a cellular phone service typically limited to 160 characters, whereas instant messaging isusually a computer session with a longermessage size. ... Both text messaging andinstant messaging are often called just plain "messaging."

13.Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for the delivery of voice communications and multimediasessions over Internet Protocol (IP) networks, such as the Internet. The terms Internet telephony, broadband telephony, and broadband phone servicespecifically refer to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN), also known as plain old telephone service (POTS).

14.Ecommerce, also known as electronic commerce or internet commerce, refers to the buying and selling of goods or services using the internet, and the transfer of money and data to execute these transactions.

15.The B2B, B2C,C2C are types of ecommerce business models.

The B2B business model is one which facilitates business transaction from one company to another example an engineering manufacturing company sells equipment to a construction company

B2C:It is a business model in which a retailer sells directly to a consumer

C2C: It is a business model in which a consumer sells to another consumer through a platform or in-person.

16. Social ecommerce and mcommerce have different meanings, though both aim at making customers' lives easier. Simply put,ecommerce is an umbrella term for selling and buying online, while mobile commerce, or mcommerce, is a subcategory of ecommerce that focus on purchasing viamobile devices.

3 0
3 years ago
A blood bank maintains two tables - DONOR, with information about people who are willing to donate blood and ACCEPTOR, with info
Kipish [7]

Answer:

The sql query is given below.

Since we need to count of males and females for a particular blood group, we put xxx for the blood group.

SELECT COUNT(SELECT DID FROM DONOR WHERE GENDER LIKE "M%") as Male_Donors,

COUNT(SELECT DID FROM DONOR WHERE GENDER LIKE "F%") as Female_Donors

FROM DONOR

WHERE BG = xxx;

Explanation:

The clauses in the query are as follows.

1. SELECT: all the columns required in the output are put in this clause.

2. FROM JOIN ON: the table(s) from which the above columns are taken are put in this clause.

3. WHERE: any condition required to filter the output is put in this clause.

The query is explained below.

1. Find the number of male donors. Number of anything can be found using COUNT() function. A query is required since gender is included in deciding the type of donor.

2. The query is defined to find number of male donors as follows.

COUNT( SELECT DID FROM DONOR WHERE GENDER LIKE "M%"; )

3. In the previous query, LIKE operator is used since it is not defined what value is stored for male donors.

4. Similarly, the query to find the number of female donors is formed.

COUNT( SELECT DID FROM DONOR WHERE GENDER LIKE "F%"; )

5. Next, the final query is formed as follows.

SELECT: both COUNT() functions will come here.

FROM: table name

WHERE: specific blood group will be put here

GROUP BY: this clause is optional and is not used in this query.

HAVING: this clause is optional and is not used in this query.

6. The query after putting all clauses is shown below.

SELECT COUNT(SELECT DID FROM DONOR WHERE GENDER LIKE "M%"),

COUNT(SELECT DID FROM DONOR WHERE GENDER LIKE "F%")

FROM DONOR

WHERE BG = xxx;

7. Alias is used in the above query for each column to get the final query.

SELECT COUNT(SELECT DID FROM DONOR WHERE GENDER LIKE "M%") as Male_Donors, COUNT(SELECT DID FROM DONOR WHERE GENDER LIKE "F%") as Female_Donors

FROM DONOR

WHERE BG = xxx;

7 0
3 years ago
Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
DIA [1.3K]

Answer: i’m thinking it’s reviewer

Explanation:

4 0
3 years ago
Read 2 more answers
Rebecca is creating a method for her class, but wants to make sure that a variable in the method satisfies a conditional phrase.
astraxan [27]

Answer:

D. an assertion

From PLATO

6 0
3 years ago
Other questions:
  • Write a program that determines the price of a movie ticket (similar to the one in the chapter). The program asks for the custom
    9·1 answer
  • In your own words, explain the role of scientific investigation in the development of the Theory of Evolution.
    6·1 answer
  • Select the statements that are true regarding the future of technology. Select 2 options.
    10·2 answers
  • The two key elements of any computer system are the____and the _____.
    7·1 answer
  • Select the correct answer.
    8·2 answers
  • It is a small hand tool used generally in decorative works such as making garnishes
    15·1 answer
  • 1. Write a program to input four numbers and store them in variables.
    6·1 answer
  • Management of software development consist of?
    15·1 answer
  • Which of the following best describes contextual design?
    10·1 answer
  • How is the architecture converted into software code? Elaborate the steps its passes through with help of examples / Diagram.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!