1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erma4kov [3.2K]
3 years ago
13

Write the syntax of FOR......NEXT loop​

Computers and Technology
1 answer:
anygoal [31]3 years ago
4 0

Answer:

Syntax:

For variable_name As [Data Type] = start To end [ Step step ]

For variable_name As [Data Type] = start To end [ Step step ]

[ inner loop statements ]

Next.

[ Outer loop statements ]

Next.

Explanation:

You might be interested in
Northern Trail Outfitters stores Last Name in a data extension. How should the text file be defined?
Crazy boy [7]

Answer:

d. Text(100)

Explanation:

The data extensions can be defined as the table with the fields of the data about contacts. It can be related to some other data extensions or can be a standalone.

In the context, the Northern Trail Outfitters stores the Last Name in the data extension which is defined as a text file as Text(100).

Choosing a proper field length and a data type ensures an efficient storage as well as retrieval of the data in the data extensions.

7 0
2 years ago
What are 3 ways to get friends to stop texting and driving?
Leni [432]
Not allow them to use their phone, tell them you won’t get in the car with them unless they stop texting and driving, inform their parents
3 0
2 years ago
Read 2 more answers
Dr. Bloom is writing a test for a history class and wants to ask a question that will have a Boolean value for the answer. Which
Valentin [98]

Answer:

Example

If [variable] = true?

Print(True)

5 0
2 years ago
What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view
Lorico [155]

Answer:

Constrained user interfaces is the correct answer to the following question.

Explanation:

Because Constrained user interfaces are the secured function that is used for controlling the access of the user to the computer system and also confines the user to access the data but they can access only that data for which they are not restricted. In other words, Constrained user interfaces is that type of restriction for those users who access your data or resources and they can access only that part of data for which they are allowed.

4 0
3 years ago
Which of the symbols below is present on the bottom row of the keyboard?
crimeas [40]

Answer:

The correct answer is D: comma.

Explanation:

The comma is located on the bottom row of the keyboard to the right of the 'M' key.

3 0
2 years ago
Other questions:
  • What is the only language a microprocessor can process directly but most programmers almost never write programs in this code?
    5·1 answer
  • WILL GIVE BRANLYIST
    6·1 answer
  • Using Turtle Graphics, write a program that will produce 2 Zs next to each other. It is irrelevant where these Zs appear and wha
    10·1 answer
  • Which of the following statements is true?
    8·1 answer
  • You cannot change data directly in the PivotTable. Instead, you must edit the Excel table, and then ____, or update, the PivotTa
    9·2 answers
  • Allison’s computer is displaying a strange error message saying that Allison, who is an administrator, does not have access to a
    15·1 answer
  • a) Before writing any code, you should go through a design process. Try to do so carefully – either follow a top-down approach,
    15·1 answer
  • In Tynker, it is not possible to create a/an __________.
    6·2 answers
  • What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b
    8·1 answer
  • Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he se
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!