1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-Dominant- [34]
3 years ago
5

Choose which three values should replace the blanks in the for loop so that it loops through the numbers: 3 6 9 12 15.

Computers and Technology
1 answer:
mestny [16]3 years ago
7 0

Answer:

3, <= 15, +=3

Explanation:

Required.

Fill in the gaps

The given code snippet written in Java programming language is an iterative statement that prints from 3 to 15 (both inclusive) with an increment of 3.

This means that, the beginning of the loop is 3 and is represented by i = 3

Also, the end is 15 and this can be represented by i<=15.

This means that all numbers less than or equal to 15 be printed

And the increment is 3.

This can be represented in two ways.

i+=3 or i = i + 3

But as used in the options, we go with i+=3

This means that each interval is separated by 3

So, the loop when filled with the above statements is:

for(int i = 3; i <=15; i+=3)

{

System.out.print(i+" ");

}

You might be interested in
Adjust list by normalizing When analyzing data sets, such as data for human heights or for human weights, a common step is to ad
finlep [7]

Answer:

I've implemented this program using python

userinput = int(input("Length: "))

mylist = []

mylist.append(userinput)

for i in range(1,userinput+1):

   userinp = int(input("Input: "))

   mylist.append(userinp)

smallval = mylist[1]

for i in range(1,len(mylist)):

   if smallval > mylist[i]:

       smallval = mylist[i]

for i in range(1,len(mylist)):

   mylist[i] = mylist[i] - smallval

for i in range(1,len(mylist)):

   print(mylist[i],end=' ')

Explanation:

I've added the full source program as an attachment where I used comments to explain difficult lines

4 0
3 years ago
Is there such thing as free will
dybincka [34]

Answer:

Yes there is but it's rare cause everywhere we go we're tied down from some rules cause they help society function better

7 0
3 years ago
Read 2 more answers
When you were configuring Encrypting File System (EFS) in the lab, a __________ on the Documents folder in the File Explorer ind
harina [27]
I’m not 100% sure but I think it’s a padlock that represents it
3 0
4 years ago
You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby o
Karo-lina-s [1.5K]

Answer:

<u>VLANs</u>

Explanation:

Virtual LANs (VLANs) are a type of network connection or arrangement of network devices in the same broadcast domain. They are called Virtual LANs because they represent fractions or subgroups in the switch ports found in an Ethernet LAN.

Indeed, because of their topological arrangement, this reduces the security risk of unauthorized access to sensitive data or devices since the host can be placed on a different VLAN. Hence, in this scenario, using this network feature would allow visitors to plug into these ports to gain internet access, but they would not have access to any other devices on the private network.

5 0
3 years ago
A user found that their personal data had been exfiltrated from their computer by a malicious program that they clicked on sever
Firlakuza [10]

Answer:

Assuming this can only have one answer, i believe adware is very far from the type of malware that did infect the system, Spyware.

Explanation:

8 0
4 years ago
Other questions:
  • Programmers use _____ languages in the Rapid Application Development (RAD) methodology to facilitate code reuse?
    5·1 answer
  • How is IT related to new business initiatives?
    6·1 answer
  • Write a program that reads in text from standard input (hint: use Scanner) and prints out the number of words in the text. For t
    5·1 answer
  • 6. Sandra did a survey to see how
    9·1 answer
  • What do the letters of the su command stand for? what can you do with su besides give yourself root privileges? "what can you do
    5·1 answer
  • Which of the following correctly orders the investments from LOWER risk to HIGHER risk?
    7·2 answers
  • What is SoC? how is it different from CPU?
    14·1 answer
  • The question is inside the screenshot
    13·1 answer
  • The auxiliary device used to store large volume of data and program for future is called​
    10·1 answer
  • Resource _____ let you view, manage, and automate tasks on multiple aws resources at a time.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!