1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slava [35]
3 years ago
6

The ________ statement acts like a chain of if statements. Each performs its test, one after the other, until one of them is fou

nd to be true or until the construct is exited without any test ever evaluating to true.
Computers and Technology
2 answers:
Sholpan [36]3 years ago
7 0

Answer: if then elseif

Explanation:

It can be a chain of statement as shown below:

while(condition)

{

      if( condition){

       Then {

             }

          }

   

     else if {

      }

}

prisoha [69]3 years ago
5 0

Answer:

If...Then...ElseIf

Explanation:

If... Then... ElseIf statement perform their tests, one after the other, until one of them is found to be true.

You might be interested in
Determine the best access modifier for each of the following situations: a. A class Employee records the name, address, salary,
Lorico [155]

Answer:

a. Protected

b. Public

Explanation:

There are four acess modifier in Java.

Default: Acessible only within the same package.

Public: Can be acessed by any class.

Private: Acessible only within the class.

For example, you have a class employee and a private method. This method can only be accessed by an object that is an instance of an employee.

Protected: Used in classes that extend each other. For example, a class of employees would extend employee.

So:

a. A class Employee records the name, address, salary, and phone number.

The best acesses modifier is protected. A class may extended employee but have the same arguments(name, adress, salary, phone number), so it should also have acess to the method.

b. An adding method inside of a class BasicMath.

This method can be used in a variety of packages and projects and classes... and there is no important information regarding security. So the best method is public.

4 0
3 years ago
Is the following statement valid or invalid? Give reason if it is invalid. int 2a = 6:​
zubka84 [21]

Answer:when the principle die the irrevocable power of attorney is valid or invalid

Explanation:

4 0
2 years ago
The benefits of a career as compared to a job include all of the following except
Digiron [165]

C and D are direct opposite so one of them cannot be true. A career will bring more responsibilities. So the answer is D. less responsibilities.

6 0
4 years ago
Read 2 more answers
(Type the correct answer in the box.)
mihalych1998 [28]

1. If in MS Access, Click on Query design, select the required Table.

 In Field select required field, in this case Select [Name of Plants]. Click on Order and set it as Ascending / Descending.

2. If you want to write a Query that it will look like this

SELECT MedicinalPlants.Name of the plantsFROM MedicinalPlantsORDER BY MedicinalPlants.Name of the Plants;

Read more on Brainly.com - brainly.com/question/3433328#readmore

4 0
3 years ago
Read 2 more answers
HELP ASAP WILL GIVE BRAINLY Question 19 Multiple Choice Worth 5 points) (05 03 MC) Network technologies specialist Hannah has be
nasty-shy [4]

Network technologies specialist Hannah would need to configure: C. RIP version 2 using Internet Protocol Version 4 (TCP/IPv4).

<h3>What is RIP?</h3>

RIP is an acronym for Routing Information Protocol and it can be defined as an intradomain routing protocol which is typically designed and developed based on distance vector routing.

<h3>The types of RIP.</h3>

In Computer networking, there are two main types of Routing Information Protocol (RIP) and these include:

  • RIP version 1.
  • RIP version 2.

RIP version 2 are generally designed and developed to include subnet masks unlike RIP version 1. Thus, Hannah would need to configure RIP version 2 using Internet Protocol Version 4 (TCP/IPv4) allow several machines on different subnets to communicate with each other using broadcasts.

Read more on routing protocol here: brainly.com/question/24812743

4 0
2 years ago
Other questions:
  • Do Y’all know how to view your answers to others people questions on your profile? Please answer fast
    14·1 answer
  • Forensic computer investigators must _____.
    6·2 answers
  • Complex communication skills will probably never be outsourced to a computer because they require the human touch.
    8·1 answer
  • A light or optical microscope most commonly used is called a(n) _____. bright-field microscope dark-field microscope electron mi
    8·2 answers
  • What is the most common way for an attacker outside of the system to gain unauthorized access to the target system?
    15·1 answer
  • Compare and contrast inertial confinement with thermonuclear reactors.
    7·1 answer
  • To copy and paste the image in MS Word the dash option is used​
    9·1 answer
  • What was most monumental decision in making a trip to Oregon?
    9·2 answers
  • A UI text element must be added to ______.an empty background container game objecta prefaba slot game objecta tray objecta canv
    6·1 answer
  • CS902 Module3 Homework1
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!