1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
3 years ago
15

In a switch statement, if a break statement is missing, _______________. Select one: a. the default case is automatically execut

ed b. the break happens at the end of each branch by default c. execution falls through the next branch until a break statement is reached d. the statement will not compile
Computers and Technology
1 answer:
Aleks [24]3 years ago
8 0

Answer:

c. execution falls through the next branch until a break statement is reached

Explanation:

In a switch statement, if break is missing, then program continues to the next cases until it finds a break statement.

Consider the following example!

Example:

#include <iostream>

using namespace std;

int main()

{

  int choice = 1;

  switch (choice)

  {

      case 1:

      printf("This is case 1, No break\n");

      case 2:

      printf("This is case 2, No break\n");

      case 3:

      printf("This is case 3, with break\n");

      break;

      default: printf("Error! wrong choice\n");

  }

  return 0;

}

Output:

This is case 1, No break

This is case 2, No break

This is case 3, with break

We have 3 cases here and case 1 and 2 don't have break statements, only case 3 has a break statement.

We called the case 1, then program continued to case 2,  and finally to case 3 where it finds the break statement and terminates.

Therefore, we conclude that in a switch statement, if a break statement is missing, then execution falls through the next branch until a break statement is found.

You might be interested in
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
Define the following term. data, database, DBMS, database system, data- base catalog, program-data independence, user wen', DBA,
wolverine [178]

Answer:

data - Any form of value in a column of a table in a relational database.

DBMS - Short for Database management system, which is a software that can be used to create, manipulate and view databases, e.g. MS SQL Server.

database system - Same as DBMS.

database catalog - Place where the metadata of a Database, its tables, users etc. exists e.g. date created, size, number of columns etc. Also known as Data Dictionary.

program-data independence - Program-data independence refers to the capability of leaving data intact and accessible regardless of modifications to the database that contains the data.

DBA - Short for Database Administrator, person responsible for maintaining the database. Its main responsibility is to keep the data clean and safe i.e. data doesn't contain wrong or invalid data, and is safe from viruses and is backed up.

end user - Anyone who is not directly interacting with a database, but through some software like website and mobile application.

persisten object - An object of a class in a program, that interacts with the underlying database and is responsible for manipulating the database connected to.

transaction-processing system - A transaction process system is part of a software, responsible for making sure critical business transactions, like crediting or debiting money, either goes through cleanly or doesn't at all.

CRUD are the four main types of operations one can do in a database environment. It stands for creating, reading, deleting and updating.

Explanation:

4 0
3 years ago
Both IT professionals and governments must apply ethical principles to certify that emerging technologies are to society.
Katarina [22]
The answer is C fair………………………
6 0
2 years ago
The software that requests mail delivery from the mail server to an Internet device is known as mail ____ software.
OleMash [197]

The software that requests mail delivery from the mail server to an Internet device is known as mail client software.

Explanation:

Mail client software is a form of communication in which electronic messages are created and transferred between two or multiple devices connected to a network series or stream.

8 0
3 years ago
In Python please.
Lubov Fominskaja [6]

Answer:

Explanation:

We have the following

t is the number of test cases.

n is the number of trips for each testcase

name is the name of the city

all the unique names are added to the list and at last the length of the list is printed.

The program is written as follows

t = int(input) - for i in range(t): n = int(input) 1 = [] for j in range(n): name = input if name not in l: 1.append(name) pr

t = int(input())

for i in range(t):

n = int(input())

l = []

for j in range(n):

name = input()

if name not in l:

l.append(name)

 

print(len(l))

Output:

8 0
4 years ago
Other questions:
  • You are starting a spreadsheet, and you would like 500 to appear in cell C3. You should _____.
    11·2 answers
  • A ________ is a dummy function that is called instead of the actual function it represents, to test that the call to and return
    8·1 answer
  • After ensuring the equipment is turned off and unplugged, what is the nest step in cleaning larger equipment by hand
    7·2 answers
  • The university computer lab’s director keeps track of lab usage, as measured by the number of students using the lab. This funct
    11·1 answer
  • The Department of Homeland Security only deals with threats to national security and does not play a role in helping companies m
    13·1 answer
  • c++ Project 6: Buoyancy. Buoyancy is the ability of an object to float. Archimedes’ principle states that the buoyant force is e
    13·1 answer
  • What do we call stores in a physical world?
    13·1 answer
  • 20 points
    5·1 answer
  • Can someone please help and answer the 6 questions on the bottom of the page
    8·1 answer
  • Complete the getOdds method so it returns a new ArrayList of Integers containing all odd Integers from the parameter ArrayList v
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!