1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mice21 [21]
3 years ago
14

Which is not one of the four criteria for proving the correctness of a logical pretest loop construct of the form: while B do S

end? a. The loop terminates. b. {I and B} S {I} c. left curly bracket I space a n d space (n o t space B )right curly bracket space rightwards double arrow space Q d. I space rightwards double arrow space P e. P space rightwards double arrow space I
Computers and Technology
1 answer:
Paul [167]3 years ago
3 0

Answer: d. I space rightwards double arrow space P

Explanation:

The loop invariant must always satisfy a number of requirements for it to be considered useful. Another consideration is the complicating factor for loop termination. Any loop which cannot terminate would always not be correct, which tends to compute nothing. Below is a complete axiomatic illustration showing the construct required for it to be true, where I is the loop invariant:

P => I

{I and B} S {I}

(I and (not B)) => Q

the loop terminates

You might be interested in
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
4 years ago
ANSWER QUICKLY!!
ehidna [41]

Answer: The answer is Proximity.

Explanation:

4 0
2 years ago
Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not
Nataly_w [17]

Answer:

This question was initially incomplete. Here is the full question:

Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?

a) The activities of a user browsing in an anonymous window will not be visible to people who monitor the user's network, such as the system administrator.

b) Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.

c) A user will not be able to log in to e-mail or social media accounts during the anonymous browsing session.

d) A user browsing in an anonymous window will be protected from viruses launched from any Web sites visited or files downloaded.

The correct answer is b) Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.

Explanation:

For e-commerce sites, shopping cart information are stored as cookies on the visitor's computer such that when the website visitor leaves the website and comes back a few days later, their shopping preferences are remembered.

If the website visitor uses an anonymous window, the cookies created during the browsing session will be deleted when the anonymous website is exited and so, items placed in the shopping cart for future purchase will not be saved.

3 0
3 years ago
________ is the relative value, either in monetary terms or in overall impact, of the resource being protected by the access con
kherson [118]

Answer:

a. Asset value

Explanation:

Asset value is the value of a share in the company.

The asset value is calculated as

= [ Difference between the total of its assets and its liabilities ] ÷ [ The number of ordinary shares issued ]

The asset value may also be the equal as the book value or the it may be same as equity value of a business.

3 0
3 years ago
What is the correct syntax to take the first five characters from the cell A2 and place it to its right in cell A3? =RIGHT(A3,5)
vfiekz [6]

Answer:=LEFT(A2,5)

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Please help me please and thank you!
    14·1 answer
  • What is the shortcut key to launch the Macros dialog box?
    14·1 answer
  • Microsoft’s SharePoint server product dramatically altered the content and records management (RM) markets. Crocker (2015), edit
    6·1 answer
  • 22. A<br> allows one computer to input data into another computer.
    6·1 answer
  • What is it called when there are an equal number of characters on either side of the horizontal center of the page?
    8·1 answer
  • / Looks up author of selected books
    15·1 answer
  • Q1 To remove filter
    15·2 answers
  • Computer engineering is a career that......
    8·1 answer
  • Write any two disadvantage of First generations computers​
    14·1 answer
  • The hexadecimal eqquivalent of (80)10 is
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!