1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nuetrik [128]
3 years ago
14

Please help me!

Computers and Technology
2 answers:
BaLLatris [955]3 years ago
8 0

Answer:

Choose what you think based on this.

Explanation:

with a for loop:

>>> students = 3

>>> for student in range(students):

>>> print(student)

would output

>>> 0

>>> 1

>>> 2

with a while loop now:

>>> students = 3

>>> student = 0

>>> while student < students:

>>> student = student + 1

>>> print(student)

the for loop is more compact than the while loop. But there may be some times when a you cant do a for loop. The first question is more than likely definite but I don't know the second answer.

Rudik [331]3 years ago
7 0

Answer:

definite, and for

Explanation:

edg 2020 VOTE ME BRAINLIEST OR ELSE!

You might be interested in
Java
shutvik [7]

Answer:

import java.util.Scanner;

//The Temperature Class Begins Here

public class Temperature {

   private double ftemp;

//The constructor

   public Temperature(double ftemp) {

       this.ftemp = ftemp;

   }

//Get farenheit Method

   public double getFtemp() {

       return ftemp;

   }

//Set farenheit method

   public void setFtemp(double ftemp) {

       this.ftemp = ftemp;

   }

// Get Celcius Method

   public double getCelcius(double ftemp){

       //double celcius =  (double) (5/9) * (ftemp - 32);

       double   celcius = (ftemp-32)* (double)5/9;

       return celcius;

   }

// Get Kelvin Method

   public double getKelving(double ftemp){

       double Kelvin;

       Kelvin = (ftemp-32)*(double)5/9 + 273.15;

       return Kelvin;

   }

}

//The Temperature Class Ends Here

//The Temperature Test Class with a main method begins Here

class TemperatureTest{

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

//Prompt User for value in fahrenheit

       System.out.println("Enter·a·Fahrenheit·temperature:");

       double ftem = in.nextDouble();

       //Making the instance of the Temperature class

       Temperature temp = new Temperature(ftem);

       //Outputing Results

       System.out.println("The·temperature·in·Fahrenheit·i: "+ftem);

       System.out.println("The·temperature·in·Celcius·is: "+ temp.getCelcius(ftem));

       System.out.println("The·temperature·in·Kelvin·is: " + temp.getKelving(ftem));

   }

}

Explanation:

This is implemented in Java programming Language

Explanations are provided as comments within the code

3 0
3 years ago
Adios brainly, wont be posting that much take my points away i d c
mrs_skeptik [129]
Omg I would die to have your points because when I get on people call me a noob because I just got the app like 3 days ago and every time I answer a question some says noob like dang I just started
5 0
3 years ago
Read 2 more answers
When the Squirrel peer-to-peer web caching service was evaluated by simulation, 4.11 hops were required on average to route a re
bogdanovich [222]

Answer:An external caching scheme stores copies of web objects

or meta-data so that clients can avoid requests to a web

server. The best known example of an external cache is a

web proxy, but with the rapid spread of web technologies,

many other caching scenarios can be identified. Caching

is central to performance in the web, both because it re-

duces load on servers, and because cached data is normally

cheaper to access from another machine that is closer in the

network. Although cooperation between cache managers is

not a common feature of existing web architectures, coop-

erative caching supported by peer-to-peer architectures has

great potential [9, 13]. When sets of client systems have sim-

ilar interests and fast low-latency interconnections, shared

caching could bring significant benefits.

The peer-to-peer mechanisms referred to

Explanation:

4 0
3 years ago
during a successful man-in-the-middle attack, which two of the following actions is an attacker most likely to perform?
Effectus [21]

During a successful man-in-the-middle attack, the  attacker most likely to eavesdrop on the communication that is taking place between two targets.

<h3>What happens during a man-in-the-middle attack?</h3>

A man-in-the-middle (MiTM) attack is known to be a term that is linked to computer and its security.

It is said to be a type of cyber attack where the attacker is known to have secretly gotten and relays messages that were passed between two parties and they are the people who are believe to be  communicating directly with one another.

Note that this form of attack is a kind of eavesdropping and attacker intercepts type and as such, During a successful man-in-the-middle attack, the  attacker most likely to eavesdrop on the communication that is taking place between two targets.

Learn more about man-in-the-middle from

brainly.com/question/15798854
#SPJ4

8 0
2 years ago
How many responses does a computer expect to receive when it broadcasts an ARP request?why?
Alla [95]

Answer: The response that is expected when it broadcast an ARP request is one or zero.

Explanation: ARP request means Address Resolution Protocol which is a protocol responsible for the mapping of the IP(Internet protocol)address of a system to the MAC(Media Access Control) layer. Only one response is received only if the IP address is present in the ARP otherwise if the IP address does not matches then no response is returned.Thus only one or zero response can be received when a ARP request is process.

5 0
3 years ago
Other questions:
  • Complete the function ConvertToFeetAndInches to convert totalInches to feet and inches. Return feet and inches using the HeightF
    5·1 answer
  • What does this road sign mean?
    11·2 answers
  • Which element in Access is an ideal data source?
    12·2 answers
  • Write a function named sortie that takes three integer parameters by reference and rearranges them in ascending order--the first
    6·1 answer
  • Given the following business scenario, create a Crow's Foot ERD using a specialization hierarchy if appropriate. Granite Sales C
    12·1 answer
  • If you were writing a story set in our time, what would you include to give readers a sense of our world? Check any that apply.
    5·1 answer
  • Write the output of the following program:
    8·1 answer
  • What are the missing words in the program?<br> divide(numA,numB):<br> numA/numB
    9·2 answers
  • Need help with my cs110​
    11·1 answer
  • Select the correct answer.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!