1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PolarNik [594]
2 years ago
15

Hello, this is for my compute science class, and I don’t know the answer, please help? Thank you in advance =)

Computers and Technology
2 answers:
quester [9]2 years ago
8 0

Haven't taken Computer Science in a year so my answer may be wrong (APCSA).

Defining Column B,

  • Selection is when a piece of code is run only when its conditions are met.
  • Iteration is typically represented by for loops, enhanced for loops, and while loops, and will all repeat until a condition is met.
  • Sequence is usually the simplest, carrying out commands in order.

From what I see, the first box in column A is a sequence as it defines and casts num1 and num2, computes its difference in int form, and prints it out. The second box in column A is a selection even though it counts to 5 in the first segment of code. The key here is the if else statement as it checks that num1 is greater than num2 before it subtracts. The third box in column A is an iteration due to its enhanced for loop.

Hope that helps! :)

Olin [163]2 years ago
3 0

Answer:bd

Explanation:

You might be interested in
A computer program that enables users to create and work with files and folders is called what?
murzikaleks [220]

Answer:

File manager

Explanation:

From the list of options 1 to 4, only option (2) is correct

Explaining the options one after the other

  • Web browser: It lets users access the internet
  • File Manager: Used to create and manage files/folders
  • User Interface: Means which the user of a computer interacts with the computer
  • File Reader: Used to read the content of a file. e.g. Adobe reader for pdf files, Notepad for text files, etc.

Having explained the options one after the other, <em>the file manager </em>is the answer to this question.

3 0
3 years ago
Read 2 more answers
A network needs to be set up with 60 subnets. Given the IPv4 class C address 192.168.100.0, what subnet mask value should be use
d1i1m1o1n [39]
We are asked for the subnet mask and the total usable host. There are given values such as a network needs to be set up with 60 subnets given that the IPv4 class C address 192.168.100.0. The subnet mask is "255.255.255.0". The total host is "254".
6 0
3 years ago
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
rjkz [21]

Answer:

Distributed DOS attacks.

Explanation:

Computers in a network or the network itself is are prone to cyber attacks. A cyber attack is a concept of taking advantage of computer network vulnerabilities, to retrieve information from the target source. An example of these types of security attacks is the denial of service (or DOS) attacks.

The DOS  or the distributed DOS attack prevents users form accessing or requesting a service that they are legitimately allowed, by flooding the target system with superfluous resource request from millions of computers, controlled by the attacker.

8 0
3 years ago
Which of the following is NOT an example of editing?
Genrish500 [490]

Answer:

ang answer po at proofreading written

content

Explanation:

if I wrong please correction me!

8 0
3 years ago
what types of physical drives does windows disable defragmenting, but provides another method of optimization?
Anika [276]

The type of physical drives does windows disable defragmenting, but provides another method of optimization is known as windows.

<h3>What is windows?</h3>

It should be noted that windows is a separate viewing area on a computer display screen in a system.

In this case, the type of physical drives does windows disable defragmenting, but provides another method of optimization is known as windows.

Learn more about window on:

brainly.com/question/25243683

#SPJ12

4 0
2 years ago
Other questions:
  • What is constructive criticism?
    5·1 answer
  • Which of the following is a step in paraphrasing? Skim the original information to get a sense of what it is about. Select a few
    15·2 answers
  • Consider the following code segment. int[] seq = {3, 1, 8, 4, 2, 5}; for (int k = 1; k &lt; seq.length; k++) { if (seq[k] &gt;=
    5·1 answer
  • Your friend is overspending and in need of a budget. What type of expense should they reduce next month?
    10·2 answers
  • (TCO C) When a remote user attempts to dial in to the network, the network access server (NAS) queries the TACACS+ server. If th
    14·1 answer
  • Controlling access of information on the internet
    15·1 answer
  • What is modularity? Help asap
    9·1 answer
  • Which of the following is a good conductor of electricity and heat?
    13·2 answers
  • Briefly explain specialisation?​
    11·1 answer
  • What would a good digital citizen do if he sees his classmate left her email account open on a school computer by mistake?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!