1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babunello [35]
2 years ago
5

Which situations are better suited to an indefinite (while) loop? Select 3 options.

Computers and Technology
2 answers:
tekilochka [14]2 years ago
6 0

Answer:

2,3 and 5

Explanation:

1 and 4 have a predetermined number of times they need to be ran, 20 and 30, which means a for loop is best for them. whereas the others will run for an unknown number of times.

liubo4ka [24]2 years ago
4 0

Answer:

  • allowing the user to enter their best friends names without saying how many friends they can have

  • writing a program to average numbers without requiring the user to count the numbers

  • having the user guess a number and keep guessing till they get it right

Explanation: Correct on Edg  2020/2021.

You might be interested in
2 Manter o autocontrole nos ajuda a evitar muitos problemas na nossa vida pessoal e no ambiente profissional. Em se tratando de
Umnica [9.8K]

Answer:

english please

Explanation:

8 0
3 years ago
Write an if statement that assigns 0.2 to commission if sales is greater than or equal to 10000.
7nadin3 [17]
If (sales >= 10000)
commission = 0.2;
8 0
2 years ago
Which two software interfaces allow adjustment of the cpu voltage? (choose two.)?
ValentinkaMS [17]
Below are the <span>software interfaces allow adjustment of the CPU voltage:
</span>

<span>UEFI Settings;
BIOS Settings

Unified Extensible Firmware Interface (UEFI) is a detail for a product program that associates a PC's firmware to its working framework (OS). UEFI is required to in the long run supplant BIOS. Like BIOS, UEFI is introduced at the season of assembling and is the principal program that runs when a PC is turned on. 
BIOS (basic input/output system) is the program a PC's microchip uses to kick the PC framework off after you turn it on. It likewise oversees information stream between the PC's working framework and joined gadgets, for example, the hard circle, video connector, console, mouse and printer.</span>
8 0
3 years ago
The name of a Variable effects its value<br><br> True<br><br> False
Y_Kistochka [10]

Answer:

option A ) true is right answer.

7 0
3 years ago
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
Other questions:
  • True or false? You can test your marketing emails in different email clients from within the email editor.
    10·1 answer
  • If you plan on operating several applications at s time, the amount of RAM should be considered when purchasing a computer
    10·2 answers
  • 1)Ce procent de grasimi putem găsi in lapte ?
    10·1 answer
  • Edhesive coding practice 3.4​
    12·1 answer
  • Convert the following pseudocode to C++ code. Be sure to define the appropriate variables. Store 25 in the speed variable. Store
    5·1 answer
  • How many bits are used to direct traffic to specific services running on a networked computer?
    6·1 answer
  • Which two actions allow the System Administrator to limit Chatter access during roll-out to a subset of Salesforce users?
    9·1 answer
  • What is the next line? &gt;&gt;&gt; myTuple = [10, 20, 50, 20, 20, 60] &gt;&gt;&gt; myTuple.index(50) 3 1 4 2
    14·2 answers
  • palindrome is a string that reads the same forwards as backwards. Using only a xed number of stacks, and a xed number of int and
    15·1 answer
  • Selection Sort List the resulting array after each iteration of the outer loop of the selection sort algorithm. Indicate the num
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!