1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
3 years ago
13

When will an on loop condition happen?

Computers and Technology
2 answers:
Rudiy273 years ago
7 0

Answer:rrrrow

r

Explanation:

rjkz [21]3 years ago
3 0

Answer:

A

Explanation:

because loop always comes in events

You might be interested in
The default view in word is ____ view, which shows the document on a mock sheet of paper in the document window.
dolphi86 [110]
<span>I'm pretty sure that the answer is: The default view in word is print layout view, which shows the document on a mock sheet of paper in the document window.</span>
7 0
3 years ago
A VALENTINE
-Dominant- [34]

Answer:

i dont see the image

Explanation:

6 0
3 years ago
Read 2 more answers
The U.S. National Institute of Standards and Technology defines the incident response life cycle as having four main processes:
GuDViN [60]

Answer:

C. Post-incident activity.

Explanation:

An incident is a event of intrusion or attack or violation of an attempt of an attack. An incident response is an opposing response to an attack or violation.

An incident response life cycle are stages followed to mitigate a current attack or violation. The stages of the incident response life cycle are, preparation, detection and analysis, containing and eradicating and recovery, and post incident activity.

7 0
3 years ago
List the correct order of steps necessary to using usmt to migrate files from an old computer to a new computer.
dlinn [17]
The USMT (User State Migration Tool) is designed to assist IT professional migrate files to the windows OS. An example is a step by step migration of files and settings from a windows XP environment to windows 8 using USMT. At the end of the day, you will have used LoadState a ScanState to complete this end to end migration. The correct order is as follows; <span><span>


1.      </span>Gather Data Using the ScanState Tool</span>

<span>a)      </span>Install USMT

<span>b)      </span>Run ScanState to Create a Migration Store on the Server

<span>2.       </span>Install Windows

<span>a)      </span>Install Applications

<span>3.       </span>Apply Data Using the LoadState Tool

<span>a)      </span>Install the USMT

<span>b)     </span> Run LoadState






8 0
3 years ago
Write a method called removeInRange that accepts four parameters: an ArrayList of integers, an element value, a starting index,
Murrr4er [49]

Answer:

public static void removeInRange(List<Integer> list, int value, int start, int end) {

       for (int i = end - 1; i >= start; i--) {

           if (list.get(i) == value) {

               list.remove(i);

           }

       }

       System.out.println(list);

   }

Explanation:

- Create a method named <em>removeInRange</em> that takes four parameters, a list, an integer number, a starting index and an ending index

- Inside the method, initialize a <u>for loop</u> that iterates between starting index and ending index

- If any number between these ranges is equal to the given <em>value</em>, then remove that value from the list, using <u>remove</u> method

- When the loop is done, print the new list

7 0
3 years ago
Other questions:
  • The network ____, the person overseeing network operations, uses a server operating system to add and remove users, computers, a
    15·1 answer
  • Jenny is working on a laptop computer and has notices that the computer is not running very fast. She looks and realizes that th
    6·2 answers
  • I need someone who knows HTML to finish the code.
    12·2 answers
  • Need this!!
    11·2 answers
  • When a speaker is finished talking, you should allow for _____.
    14·2 answers
  • 5. RAM IS YOUR SYSTEM’S-
    14·2 answers
  • For question 1-3, consider the following program: def tryIt(a ,b = 7) return a + b
    8·1 answer
  • Why do computers use binary code?
    12·2 answers
  • What is computer give definition ​
    14·2 answers
  • Which TWO of these correctly describe a Trojan horse malware?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!