1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wlad13 [49]
3 years ago
10

Select all statements below that are TRUE for For...Next loops. A. It is used for a fixed number of iterations. B. It is used fo

r a variable number of iterations. C. It uses an integer counter; not a loop condition. D. It uses a loop condition; not an integer counter. E. Only consider this option if you checked alternative D above: It checks the loop condition a the BEGINNING of the loop, F. Only consider this option if you checked alternative D above: It checks the loop condition a the END of the loop,
Computers and Technology
1 answer:
sasho [114]3 years ago
7 0

Answer:

A and C

Explanation:

The for next loop is used for a fixed number of iterations which is usually indicated in the syntax. It uses a counter that increments on each iteration. The loop terminates when the counter reaches the number of initially specified iterations. It is different from a while loop which depends on a specified condition evaluating to the Boolean 'true'.

You might be interested in
According to symbolic interaction theory, the internet has helped to remove:
DanielleElmas [232]

Answer:

According to symbolic  interaction theory, the internet has helped to remove:

(D) Time and space barriers.

Explanation:

  • The symbolic interaction theory is such theory which explains that language and symbols are the means of interaction in the social worlds. This theory tells us about the relationship between people in a society.
  • The option a is not correct as the internet has not remove the subculture rather it has provided safe space to it. Sub-culture refers to a group of special interest like group of a biker. Anyone can create their community on the internet.
  • The option b is also incorrect as internet has not remove interpersonal communication rather it has speed up this communication. It is a type of communication in which people communicate with each other via their expression of feelings, verbal and non-verbal means.
  • The option c is also incorrect as the inappropriate content has removed by internet rather now everyone can create content. But regulations and guidelines are being made. A lot of work has been to be done in this area.
  • The option d is correct as the internet has helped to remove the barriers of time and space. It has made this world a global village now anyone from any part of the world can talk to any person to other part of the world over the internet. They can create communities depending upon their interests. They can do business and many other things.
5 0
3 years ago
When the program generates or populates reports after getting the data and processinng,it is called
TiliK225 [7]

Answer:

In computing, extract, transform, load (ETL) is the general procedure of copying data from one or more sources into a destination system which represents the data differently from the source(s) or in a different context than the source(s).

Data extraction involves extracting data from homogeneous or heterogeneous sources; data transformation processes data by data cleansing and transforming them into a proper storage format/structure for the purposes of querying and analysis; finally, data loading describes the insertion of data into the final target database such as an operational data store, a data mart, data lake or a data warehouse. Hope this helps! PLEASE GIVEE ME BRAINLIST!!! =)

6 0
3 years ago
Ideally, how long or how many sentences should your video game pitch be?
Olin [163]
Good shot hdhhdbsb suhsbsbs bbsbsbsbdbbdbdbdbdbbd
6 0
4 years ago
Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________. ensuring t
bazaltina [42]

Answer: ensuring that a system is not changed by a subject that is not authorized to do so

Explanation: Access control refers to pribcues which are employed in the bid thlo ensure the security of data and information. It provides the ability to authenticate and authorize access to information and data thereby preventing unwarranted access and tampering of the information. Integrity in terms of data security and access control is is concerned with modification to an existing or original data by unauthorized sources. When unauthorized addition or subtraction occurs on a data, the integrity of such data has been compromised. Therefore, authorization is required whenever a source is about to access certain information whereby only those with the right authorization code will be allowed, Inputting an incorrect pass code after a certain number of tries may result in system lock down as access control detects a a possible intrusion

4 0
3 years ago
In C coding, write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the int
lbvjy [14]

The program illustrates the use of modulo operators

The modulo operator is used to return the remainder of a division

Take for instance:

5 % 3 is 2, because the result of 5 divided by 3 is 1 remainder 2

So, the complete program, where comments are used to explain each line is as follows:

#include<iostream>

#include<string>

using namespace std;

int main(void) {

//This declares num as integer

int num;

//This declares binary as string

string binary;

//This gets input for num

cin>>num;

//The following iteration is repeated while num is greater than 0

while(num>0){

   //This gets the remainder of num divided by 2

   binary+=to_string(num%2);

   //This divides num by 2

   num/=2;

}

//The reverses the binary string

binary = string(binary.rbegin(),binary.rend());

//This prints the binary string

cout<<binary;

return 0;

}

At the end of the program, the binary string is printed

See attachment for sample run

Read more about modulo operators at:

brainly.com/question/17760417

5 0
2 years ago
Other questions:
  • You are troubleshooting a computer that is in the design phase. The problem you see is that the CPU is not receiving information
    13·1 answer
  • Which of the following would determine how many elements are in values?
    15·1 answer
  • A machine is a group of mechanical devices that transfer ___ input at one device into output at another device.
    6·1 answer
  • Which is a credit card balance A. The amount of interest you must pay the credit card company B. The required minimum payment to
    5·1 answer
  • What is computer Network?​
    14·2 answers
  • Georgenotfound??? question mark??
    15·2 answers
  • Imported data that maintains a refreshable link to its external source is called ____ data.
    7·1 answer
  • We can draw crescent using ?
    12·2 answers
  • .A card that connects directly to the motherboard of the computer and has external sockets so that the computer can be connected
    6·1 answer
  • with a ____ the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segreg
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!