1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
7

Anisha was learning ‘for’ and ‘while’ loop. Help her understand why for and while loops are called entry controlled loops.

Computers and Technology
1 answer:
Andrew [12]3 years ago
6 0

Entry controlled loop - <u>The loop which has a condition check at the entrance of the loop, the loop executes only and only if the condition is satisfied is called as entry control loop.</u>

So, for and while loops are its examples.

You might be interested in
Zola is very skilled with Microsoft and Apple, and she knows different methods of programming. This knowledge will help make Zol
hammer [34]
I believe programmer would be your answer! If there is a multiple choice, please tell me in the comments of this answer!
3 0
3 years ago
Read 2 more answers
Write an if/else statement that compares the double variable pH with 7.0 and makes the following assignments to the int variable
levacccp [35]

Answer:

if (pH<7.0){

          neutral=0;

          base=0;

          acid=1;

      }

      else if (pH>7.0){

          neutral=0;

          base=1;

          acid=0;

      }

      else if (pH==7.0){

          neutral=1;

          base=0;

          acid=0;

      }

Explanation:

As required by the question, if and else statements have been used to test the value of the pH and assign the apropriate values to the variables neutral, base and acid.

The code snippet below can be used to prompt the user to enter values for pH

<em>import java.util.Scanner;</em>

<em>public class pHTest {</em>

<em>   public static void main(String[] args) {</em>

<em>      Scanner scr = new Scanner(System.in);</em>

<em>       System.out.println("Enter a value for the pH");</em>

<em>       int neutral, base, acid;</em>

<em>       double pH = scr.nextDouble();</em>

<em> if (pH<7.0){</em>

<em>           neutral=0;</em>

<em>           base=0;</em>

<em>           acid=1;</em>

<em>       }</em>

<em>       else if (pH>7.0){</em>

<em>           neutral=0;</em>

<em>           base=1;</em>

<em>           acid=0;</em>

<em>       }</em>

<em>       else if (pH==7.0){</em>

<em>           neutral=1;</em>

<em>           base=0;</em>

<em>           acid=0;</em>

<em>       }</em>

<em>} }</em>

4 0
3 years ago
Read 2 more answers
Whers the main characteristic of a Peer-to-peer (P2P) network?
ioda

The answer to this would be B

5 0
3 years ago
PLEASE HELP
Schach [20]

Answer:

Here

Explanation:

If you use a single user account on your computer, everyone will share the same application settings, files, and system permissions. Application Settings: When you use a single user account, everyone using the computer will use the same browser. Most programs will use different settings for each user account.User accounts also serve as a means for granting permissions, applying logon scripts, assigning profiles and home directories, and linking other working-environment properties to a user.

hope it helps ;P

7 0
3 years ago
True or false? risk assessment should cover personnel, as well as technical support such as firewalls, secure operating systems
TEA [102]
Risk assessment should cover all the processes and systems included in an organization. This means this includes also the technical support including <span>firewalls, secure operating systems and networks, and antivirus protection. Risk is always present and inevitable in every way so it is important to anticipate and make early detections to counter with actions as soon as one can.</span>
5 0
3 years ago
Other questions:
  • 1. The process of creating workable systems in a very short period of time is called
    5·1 answer
  • Questions 1 )When does a spring tide take place?
    14·2 answers
  • Suppose alice, with a web-based e-mail account (such as hotmail or gmail), sends a message to bob, who accesses his mail from g
    10·1 answer
  • 7. The penalties for a first-time DUI charge include a fine of __________. A. up to $500 for a BAL of .08 to .15 B. $500-$1,000
    5·1 answer
  • When protecting a worksheet all cells are locked by default.?
    10·1 answer
  • Two of the people most often credited with the invention of the Internet and WWW respectively are _____.
    14·1 answer
  • Which person would be the best fit for a career in the Information Technology field?
    6·2 answers
  • The image below shows an encoding for a black and white pixel image. The first two
    13·1 answer
  • Select the correct answer from each drop-down menu. Computer memory stores data as a series of 0s and 1s. In computer memory, re
    14·1 answer
  • Find each of the following products using distributive property a) 735 × 16​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!