1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlekseyPX
3 years ago
9

Can someone help me with this trace table - its computer science

Computers and Technology
1 answer:
Rasek [7]3 years ago
8 0

TThe while loop keeps going until count is greater than or equal to 10.

count = 0, sum = 0

count = 2, sum =2

count = 4, sum = 6

count = 6, sum = 12

count = 8, sum = 20

count = 10, sum = 30

Now that count is equal to 10, it exits the while loop and the program ends. The values above complete your trace table.

You might be interested in
A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th
Murrr4er [49]

Answer:

" Non-persistent" is the right response.

Explanation:

  • A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.
  • Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.
6 0
3 years ago
¿que lenguaje de programacion usan los operadores matematicos?​
kolbaska11 [484]

Answer:

Matlab / GNU Octave. MATLAB (laboratorio de matrices) es un entorno informático numérico multiparadigma y un lenguaje de programación de cuarta generación.

Explanation:

8 0
3 years ago
Read 2 more answers
Type the correct answer in the box. Spell all words correctly. Complete the sentence below that describes an open standard in vi
Anika [276]

Answer:

digital

Explanation:

Today, video production has become digital, and all playback devices work on the open standard known as digital technology.​

8 0
3 years ago
What would be the best course of action for the scenario below? A user has a large amount of data that she or he needs to store.
horrorfan [7]
Bluetooth connection data on nonvolatile storage media such as a USB
7 0
3 years ago
What will be the output of the following query on the table below?
shtirl [24]

Answer:

b

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which key do programmers use to end running programs?
    14·2 answers
  • Frank works for an organization that wishes to install a software program on a single server with multiple users connected. Whic
    8·2 answers
  • During an interview, your non-verbal communication (body language, gestures, tone of voice, speed of talking,
    6·1 answer
  • To increase the view of a document on the screen, use the _____. View icon Zoom slider full-screen reading boldface font
    9·1 answer
  • Tamara has $500 she is looking to save for a class trip. She wants to earn the most possible interest and will not need access t
    7·1 answer
  • Jack has a fear of getting up in front of a group of people and giving a presentation. When he gave his last presentation, he ta
    5·2 answers
  • Different between internet and email​
    5·1 answer
  • Which symbol would be used in a flowchart to represent a connection to another part of the flowchart
    5·1 answer
  • How is a WAN different from a LAN?
    10·1 answer
  • Microsoft Word cannot be used to create personalized web<br> pages.<br> OTrue<br> False
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!