1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artist 52 [7]
3 years ago
5

What is the output of the following code: ​ for (loop = 1; loop <3; ++loop) System.out.print(1); for (loop2 = 1; loop2<3;

++loop2) System.out.print(2); ​
Computers and Technology
1 answer:
Mama L [17]3 years ago
7 0

Answer:

The output of the given code as follows:

<u>Output: </u>

1122

Explanation:

In the given java code the two for loop is defined, which can be described as follows:

  • In the first loop, a"loop" variable is used, which starts from 1 and ends when the value of loop is less than 3, inside the loop a print function is used, that print value 1.
  • In the next step, another for loop is declared, inside the loop a variable "loop2" variable is used, that's working is the same as the above loop, but in this loop, it will print a value, that is 2.
You might be interested in
Give two reasons why cloud computing could be detrimental to a company.
dimulka [17.4K]

Security/Insider threats.

As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.

Cyber-attacks.

Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.  


3 0
4 years ago
A type of technology that can be attached to a tag and used to identify postal packages is a(n)
deff fn [24]

Answer: bar code

Explanation: that is what it is

5 0
3 years ago
Plz help me for this !!!!!!!!!!!
harina [27]

Answer:

what do u need help with??

8 0
3 years ago
Which action will help you protect data in computer in case of an earthquake?
Dennis_Churaev [7]

Answer:

having a backup disk or storing the information in the cloud

Explanation:

7 0
4 years ago
Which term describes the variable x in this program?
bazaltina [42]

Answer: a sentinel value

Explanation:

a sentinel value is a value that is used as a condition to end the program. notice that it says "enter -1 to end"

7 0
2 years ago
Other questions:
  • Before starting a spreadsheet, it is smarter to plan ahead and think through the design. true or false
    13·1 answer
  • In two to three paragraphs, come up with a way that you could incorporate the most technologically advanced gaming into your onl
    10·1 answer
  • Jeffrey works with a huge database of spreadsheet records each day. To organize and identify these spreadsheets, he wants to ass
    8·1 answer
  • Which of the following changes would be LEAST LIKELY lead to economic growth in a country?
    12·1 answer
  • What is a slide master ?
    8·2 answers
  • What is the major benefit Smartphones and tablet computers have had on social media?
    9·1 answer
  • Select the correct answer.
    15·1 answer
  • Second Largest, Second Smallest Write a program second.cpp that takes in a sequence of integers, and prints the second largest n
    15·1 answer
  • Explain what the problems with the implementation of the function are, and show a way to fix them.// return true if two C string
    7·1 answer
  • Evaluate a career in the telecommunications industry that most interests you. What about the career appeals to you?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!