1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lyudmila [28]
3 years ago
5

Hello pls answerwhat is the use of loop in java​

Computers and Technology
1 answer:
xxMikexx [17]3 years ago
7 0
The use of loop in java is to run a block of code for a certain number of times.
You might be interested in
What are the benefits of using a multiview sketch to communicate a design?
maks197457 [2]
There are three dimensions of an object-- the top, the front, and the side views. A Multiview sketch shows two or three views of an object. Multiview sketch gives the shape description of the object. It also serves as the main form of communication between manufacturers and sketchers. 
6 0
3 years ago
Which form of investigation aims at checking whether or not a target system is subject to attack based on a database of tests, s
VikaD [51]

Answer:

<em>Empirical technical </em>research has a fundamental objective, which is to provide objective and independent information on the quality of the product to the interested party or stakeholder. It is one more activity in the quality control process.

Explanation:

Testing is basically a set of activities within software development. Depending on the type of tests, these activities may be implemented at any time during said development process. There are different software development models, as well as test models. Each one has a different level of involvement in development activities.

In a full penetration testing process, there are pre-instances to run this tool, but to take the first steps it is probably the best way to start. Nmap is a network scanning tool that allows you to identify what services are running on a remote device, as well as the identification of active computers, operating systems on the remote computer, existence of filters or firewalls, among others.

In simple words, when a server or device is going to be attacked, the attacker can carry out different attacks depending on the service: it is not the same to damage a web server, a database server or a perimeter router. Therefore, in any deployment, the first step will be to identify the services in the infrastructure, to decide how to proceed and, considering that in a penetration test the steps of an attacker are “imitated”, it will also be started in the same way.

5 0
4 years ago
Which of the following is an advantage of using
SVETLANKA909090 [29]

Answer: preserves cell formatting and formulas

saves time

avoids copy-paste

organizes data so it is easier to draw comparisons

Explanation: just did it

8 0
3 years ago
Read 2 more answers
In the mouse properties Window, you Can
Dovator [93]
Change different options and settings to make your mouse pointer cooler. Like the buttons work, pointer looks, pointer works, wheel works and more.<span><span /></span>
4 0
3 years ago
When creating any digital work, what is the MOST important thing to remember?
kvasek [131]

Answer:

ALWAYS  double check your work

Explanation:

3 0
3 years ago
Other questions:
  • Explain what the 35ppm specification means
    13·1 answer
  • The ________ multiple-selection PHP statement is used to handle decision making and can be used to replace multiple if and if...
    12·1 answer
  • What is not an option when a user is exporting contacts to share with others?
    10·1 answer
  • Produce definition in computer
    9·2 answers
  • What is computer sences​
    6·1 answer
  • Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?
    5·2 answers
  • Why media is far from government​
    6·2 answers
  • A serial schedule:
    8·1 answer
  • Importance of folders on a computer <br>​
    10·1 answer
  • Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!