1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
egoroff_w [7]
3 years ago
14

Owen is writing a program that will lock his computer for one hour if the incorrect password is entered more than five times. Ha

ving the code repeat five times is an example of
a loop
an algorithm
debugging
logical reasoning
Computers and Technology
1 answer:
kiruha [24]3 years ago
5 0

Answer:

Your answer is <em>I think </em>A) A loop

Explanation:

In computer programming, a loop is a sequence of instruction s that is continually repeated until a certain condition is reached.

You might be interested in
What are the values of the following expressions? In each line assume that,
MissTica

Answer:

double x = 2.5;

double y = -1.5;

int m = 18;

int n = 4;

string s = "Storm";

string t = "Watch";

The output of the expression "x + n*y - (x+n)*y" is "6.25".

and the output of expression "m/n + m%n" is "6".

Explanation:

for the first expression,

x + n*y - (x+n)*y ,put value of every variables in it.

=2.5+4*(-1.5)-(2.5+4)*(-1.5)

=2.5-6.0-(6.5*(-1.5)

=-3.5+9.75

=6.25

for the second expression,

m/n + m%n,  put value of every variables in it.

=18/4 +18%4

=4+2      ("/ will give quotient and % will give remainder")

=6

4 0
4 years ago
Filtering of packets as they leave the network destined for the internet is called ____________ .
e-lub [12.9K]
<span>Filtering of packets as they leave the network destined for the internet is called packet filtering. This firewall technique is also known as static filtering, and it is mainly used to control network access through the process of monitoring both outgoing and incoming packets. Along with monitoring, it functions to allow the packets to pass or halt which takes place based on the source of Internet Protocol.</span>
6 0
4 years ago
An example of a(n) ____ reconnaissance attack is a user who sends SQL injections to a system in hopes of generating some type of
Elden [556K]
The answer to this question is A
7 0
3 years ago
Read 2 more answers
(03.05 LC) Match the term with its description. (4 points) Column A 1. Acid : Acid 2. Alkaline : Alkaline 3. pH : pH 4. Ion : Io
Nady [450]

Answer:

Follows are the matching to this question:

Explanation:

Column  A            Column B

     1                           c

     2                          d

     3                          b

     4                          a

Description of the matching:

  • In 1(Acid) the correct choice is (c) because the acid (HCl) dissociates to both the H+ ion and the Cl- ion as a solution.  
  • In 2(Alkaline ) the correct choice is (d) because alkaline NaOH is a solution that differentiates between the ions ( OH-) and Na+.  
  • In 3(pH ) the correct choice is (b) because for an A compound of less than 7 is an acid and an alkaline pH compound of more than 7. For neutral compounds, a pH of 7 is applicable.
  • In 4(Ion) the correct choice is (a) because Na+ ion is loaded positive, and Cl-ion is loaded negatively.
8 0
3 years ago
(Editing)
Semmy [17]

Answer:

Cut means to another shot. Or cutting off part of a shot. Trim means to shorten the shot (and there are trim tools.)

Trimming usually refers to taking off either part of the beginning or end of a video clip. Sometimes this is referred to as trimming the top or tail (beginning or end)

Explanation:

~Hope this helps

3 0
3 years ago
Other questions:
  • A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more
    5·2 answers
  • Which of the following refers to a feature of wikis that allows the restoring of earlier work in the event of a posting error, i
    9·1 answer
  • An enterprise system is a packaged software application that helps integrate various ___________ in a company.
    15·2 answers
  • The CPU converts into information. The CPU is the mastermind of the computer, controlling everything that goes on through a seri
    12·2 answers
  • Two machines can finish a job in StartFraction 20 Over 9 EndFraction hours. Working​ alone, one machine would take one hour long
    10·1 answer
  • 15
    9·2 answers
  • Write the code for invoking a method named sendsignal. there are no arguments for this method . assume that sendsignal is define
    12·1 answer
  • On the Format tab, which group allows you to select a different font for a chart?
    7·2 answers
  • A software license gives the owner the to use software.
    12·2 answers
  • How do you measure the capacity of speed and memory of computer system<br>Explain.​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!