1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luda [366]
2 years ago
14

The function of while loop is

Computers and Technology
1 answer:
Alona [7]2 years ago
4 0

Answer:

B repeat a chunk of code until the condition is true im 88% sure

You might be interested in
Who are all the fnaf characters?
vitfil [10]

Answer: Freddy Bonnie Chica Foxy Golden Freddy Endo 01 Toy Freddy Toy Bonnie Toy Chica Mangle Balloon Boy Marionette Withered Freddy Withered Bonnie Withered Chica Withered Foxy Withered Golden Freddy Shadow Freddy Shadow Bonnie Endo 02 JJ Phantom Freddy Phantom Balloon Boy Phantom Chica Phantom Foxy Phantom Mangle Phantom Puppet SpringTrap Nightmare Freddy Nightmare Bonnie Nightmare Chica Nightmare Foxy Nightmare Balloon Boy Nightmarionette Nightmare Nightmare FredBear Nightmare JJ Plushtrap.




Explanation: I can only tell you fnaf 1, fnaf 2, fnaf 3, fnaf 4

8 0
2 years ago
New Top Level Domains (TLDs) are coordinated by:_______.
Marizza181 [45]
ICANN is the answer
7 0
3 years ago
To what are multiple servers arranged in racks related
qaws [65]

Various number of servers placed in racks are related to Rack servers in data center.

Explanation:

In data center commonly used server is Rack servers.  Servers are being arranged in the mounted racks are generally called as rack servers in the data center. Internal fans are being fitted inside the racks make the servers to make a good airflow and maintain the cooling. There are different types of racks available the user can choose based on their requirement.

5 0
3 years ago
Read 2 more answers
Which symbol is used for an assignment statement in a flowchart?
Pavlova-9 [17]

Equal symbol

equal symbol

Within most programming languages the symbol used for assignment is the equal symbol.

4 0
3 years ago
What name is given to any changes to the original data such as users manually modifying data, programs processing and changing d
nadezda [96]

Modification is the name given to an attack that makes changes into original data such as users manually modifying data, programs processing and changing data, and equipment failures.

In modification attacks, only changes are made to original data without deleting it completely. Modification is basically a type of attack in the context of information security. This type of attack creates annoying situations and discords by altering existing data in data files, inserting new false information in the network and reconfiguring network topologies and system hardware.

Modification attack is mainly mounted against sensitive and historical data. Modification attacks target integrity of the original data with an intent of fabricating it.

You can learn more about ha-cker attack at

brainly.com/question/14366812

#SPJ4

3 0
1 year ago
Other questions:
  • An automobile battery, when connected to a car radio, provides 12.5 V to the radio. When connected to a set of headlights, it pr
    11·1 answer
  • A defined set of standards that computers must follow in order to communicate properly is known as a
    13·2 answers
  • Upgrading only the motherboard will give some performance improvement to a computer system. Why would the improvement be limited
    14·1 answer
  • Forms often allow a user to enter an integer. Write a program that takes in a string representing an integer as input, and outpu
    9·1 answer
  • Write a function all_cats that consumes a comma-separated string of animals and prints whether all of the animals have "cat" in
    12·1 answer
  • Why won't Brainly let me send a link? This is just du*mb! I want to send good articles explaining a content, and this site just
    5·1 answer
  • Anyone here play osu! ?
    11·2 answers
  • Imagine that you are about to make a presentation during an online meeting, where people will need to be able to see you, and yo
    10·1 answer
  • Assume that the Vehicle class contains a virtual method named CalculateMaxSpeed(). Assume that both the MotorVehicle and Automob
    12·1 answer
  • Fifteen years ago, everyone didn't have a cell phone. Anyone developing an app would not have found many users. Today, the exist
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!