1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lyudmila [28]
3 years ago
5

Hello pls answerwhat is the use of loop in java​

Computers and Technology
1 answer:
xxMikexx [17]3 years ago
7 0
The use of loop in java is to run a block of code for a certain number of times.
You might be interested in
Which activity does not allow a person to perform any work while at the shop
polet [3.4K]

Is it apprenticeship???:D

5 0
3 years ago
The purpose of​ a/an _________ system is to capture best practice solutions and program them into a set of rules in a software p
Dmitriy789 [7]
The purpose of an expert system is to capture best practice solutions and program them into a set of rules in a software program. Expert systems are computers that use artificial intelligence technologies to simulate a behavior of a human or another subject. 
The knowledge about a specific subject is transformed with this system into a software code. 
8 0
3 years ago
Integrity constraints are enforced by Group of answer choices A. The operating system B. The end user C. The database designer D
slega [8]

Integrity constraints are enforced by The database designer.

<h3>What are Integrity constraints?</h3>

An  Integrity Constraints is known to be the protocols that a table's data columns is mandated to follow.

Note that they are used to hinder the types of information that can be put into a table and as such, Integrity constraints are enforced by The database designer.

Learn more about Integrity constraints from

brainly.com/question/28026113

#SPJ1

4 0
2 years ago
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
3 years ago
Just help :(((((((((((((((((((((((((((((((((((
saveliy_v [14]

Answer:

I am sure the answer is A

Explanation:

As you can see from the graph, the first time they pumped air, the numbers were 6, 1.2, and 2. Once they start pumping the numbers decrease. Therefore, I think the answer is A. It went to 5.7, 4, and 2 from 6, 1.2, and 2.1.

5 0
2 years ago
Other questions:
  • Operating system software allows you to use your fingers, a mouse or other pointing device to select screen controls, such as bu
    5·2 answers
  • Musccanic Inc., a company that manufactures microprocessors, updates the technology used in its microprocessors once every four
    15·1 answer
  • What important information is needed if you are installing an oem version of windows 7?
    6·1 answer
  • Give 5 uses of software and hardware.
    15·1 answer
  • Suppose a MATV/SMATV (Satellite Master Antenna Television) firm has to start it's operation in the metropolitan area of a countr
    12·1 answer
  • What are the purposes of a good web page design?
    9·2 answers
  • PLEASE I NEED HELP FAST
    8·1 answer
  • ¿Qué ayuda nos proporcionan las herramientas tecnológicas en estos tiempo de pandemia? ayudaaaaa plis
    9·1 answer
  • Means storing,accessing information over the internet other than hard drive and your system
    15·1 answer
  • Over the last decade, the overall energy consumption of cloud data centers worldwide has remained relatively the same. Why is th
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!