1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
3 years ago
10

What's the difference between repetition and selection control structure.​

Computers and Technology
2 answers:
mixer [17]3 years ago
7 0

Answer:

Selection statements test conditions and selectively execute code depending on the outcome of the test condition, whereas repetition statements repeat a set of statements till a test condition is satisfied.

soldi70 [24.7K]3 years ago
3 0

Answer:

repetition control structure is the grouping of codes which are designed to repeat a set of of related statements whereas selection control structure performs different computations based on the result that is obtained after checking conditions

You might be interested in
The sum of all the minterms of a boolean function of n variables is equal to 1.
Aleksandr-060686 [28]

The answers are as follows:

a) F(A, B, C) = A'B'C' + A'B'C + A'BC' + A'BC + AB'C' + AB'C + ABC' + ABC

= A'(B'C' + B'C + BC' + BC) + A((B'C' + B'C + BC' + BC)

= (A' + A)(B'C' + B'C + BC' + BC) = B'C' + B'C + BC' + BC

= B'(C' + C) + B(C' + C) = B' + B = 1


b) F(x1, x2, x3, ..., xn) = ∑mi has 2n/2 minterms with x1 and 2n/2 minterms

with x'1, which can be factored and removed as in (a). The remaining 2n1

product terms will have 2n-1/2 minterms with x2 and 2n-1/2 minterms

with x'2, which and be factored to remove x2 and x'2, continue this

process until the last term is left and xn + x'n = 1

4 0
3 years ago
Your network employs basic authentication that centers on usernames and passwords. However, you have two ongoing problems. The f
Agata [3.3K]

Answer:

Using a one time password OTP and using a three factor authentication.

Explanation:

Social engineering is a form system and network attack, drafted by an attacker, to steal user credentials needed for accessing their accounts, to steal information.

Social engineering attacks like phishing, spear phishing, baiting and quid quo pro are used to fool users to giving out their user details.

One time password is an implied use of a password just once and a new password his generated to boost security. In a three factor authentication, OTP can be used as well as biometrics of a user which can not be giving away by a user to an attacker.

8 0
3 years ago
1.The hardware that allows data to be transmitted from a computer along a telephone line to another computer at the other end is
valkas [14]

So this is called a modem we use it to send  and receive info over telephone lines

Hope this helps

-scav

4 0
3 years ago
In this image, which feature did we most likely use to quickly change the background, fonts, and layout?
MAVERICK [17]

Answer: themes

Explanation:

Took the test

3 0
3 years ago
A mail merge data source must contain
Katena32 [7]

Answer:

A. a collection of organized data.

Explanation:

It can be a data source, or a database, an excel sheet. or access database. However, it must be well-formatted and hence organized. filtering of data is not necessary, as well as it is not any barrier to the number of the set of data, or the data being sorted. Unsorted data is also fine, and multiple set of data is also fine. It must be known that a data source can be formed from multiple sets of data through the query. And the resultant data source can be used by the mail merge. However, the data source must be a collection of organized data. Hence, A is the correct answer.

5 0
3 years ago
Other questions:
  • The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
    13·1 answer
  • Write a program with a function that accepts a string as an argument and returns a copy of the string with the first character o
    11·1 answer
  • The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
    11·1 answer
  • How many pounds must a sand bag weigh to test if a safety net can absorb the proper amount of force? A. 150 lbs. B. 200 lbs. C.
    6·1 answer
  • What property must be set on a menu item to have the user activate that option by pressing Ctrl C on the keyboard
    11·1 answer
  • Write a function sumOfMultiples, that inputs two integers - seed and cap. The function should return the sum of all the multiple
    6·1 answer
  • Assignment 10 - 1/0 Streams and Files Create a C++ a program that will compute the average word length (average number of charac
    13·1 answer
  • Which of the following is not considered essential for an electronic device to be called a computer?
    15·1 answer
  • Which era marked a switch from agricultural practices to industrial practices?
    6·1 answer
  • Write a program that accepts the lengths of three sides of a triangle as inputs. the program output should indicate whether or n
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!