1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iogann1982 [59]
3 years ago
13

PLS HURRY!! Look at the image below

Computers and Technology
1 answer:
Crank3 years ago
4 0

The output will be 10.

The while loop runs until numb is equal to or less than 13.

25 - 5 = 20

20 - 5 = 15

15 - 5 = 10, which is less than 13 so the loop stops and 10 is printed to the screen.  

You might be interested in
A virus is a self-replicating program that produces its own code by attaching copies of it into other executable codes.
Allisa [31]

Answer: Stealth/Tunneling Virus

Explanation: Stealth or tunneling virus are the virus which are responsible for attacking a computer system which causes the problem in the functioning of the operating system by manipulating files, creating partition etc.

These viruses try to avoid or prevent the anti-virus scans for the detection any sort of virus or error . They act to prevent any malfunction detection by taking charge for the anti-virus operation.

5 0
3 years ago
Jenny wants to look at row 345 and compare it to row 17. What can she do if she wanted to easily adjust to see both at once?
S_A_V [24]

Assuming that Jenny is using MS Excel, the best way to look at both rows would be with the help of the "Freeze Panes" feature found in the View tab of the dashboard.

Jenny would simply have to select row 17 and click on "Freeze Panes". Once the panes are locked, Jenny will then have access to scroll down to row 345 with row 17 still showing its values.

8 0
4 years ago
I’ll give brainliest
Stolb23 [73]

Answer: ] Data moving to the cloud puts it at risk for malware. Increasing user mobility and results in data taken outside of an organization’s security perimeter, exposing their business to risk. Cloud services pose security challenges putting pressure on security teams, thus fueling the growth of . The basic pillars or features of  are Visibility, Access Control, Threat Protection, Data Security, and Compliance. Two camps are emerging: pure plays and large security vendors adding to a broad cloud security solution. Several startups are emerging and there has been intense M&A activity in recent years. Cloud apps are a new opportunity for hackers to gain access to an organization's data and its network.  has developed quickly from just being used for shadow IT. It is an important tool to monitor cloud usage and also implement security.  is a small but fast growing market in a state of flux.

Explanation:

6 0
3 years ago
What is not a form of renewable energy
trasher [3.6K]
Coal and oil are not forms of renewable energy because they will eventually run out. Wind, water and solar power will never run out and are therefore renewable.
3 0
3 years ago
What does the Java Virtual Machine seek first?
Lady_Fox [76]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The Java Virtual Machine seek first class loader, where this machine load, link and initialize the classes.

However, at the architecture level, when you are running java code in different machine/operating systems, it will seek first firewall.

5 0
3 years ago
Other questions:
  • His function starts a new session.
    12·1 answer
  • Enter the value of 5⋅(13.5−4.5). <br> ​
    5·1 answer
  • Changes in the ownership of a file do not change the amount of data that is considered to belong to a user.
    12·1 answer
  • Your company collects and stores security camera footage. Within the first 30 days, footage is processed regularly for threat de
    10·1 answer
  • Project 4: Strictly Identical arrays
    7·1 answer
  • Of the key reasons for creating organizational units which of the following is not one of them?
    13·1 answer
  • Which statement best describes antivirus software?
    13·1 answer
  • What is the determining criterion for removing older transactions from a company file
    9·1 answer
  • Jonah disagrees with the opinion expressed in the post he just read. What should he do?
    12·2 answers
  • Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!