1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fomenos
2 years ago
11

What is the difference between (IF instructions & WHILE instructions ) 0 를 들 T !

Computers and Technology
1 answer:
lara31 [8.8K]2 years ago
7 0

Answer:

While statements determine whether a statement is true or false. If what’s stated is true, then the program runs the statement and returns to the first step. If what’s stated is false, the program exits the while and goes to the next statement. An added step to while statements is turning them into continuous loops. If you don’t change the value so that the condition is never false, the while statement becomes an infinite loop.

If statements are the simplest form of conditional statements, statements that allow us to check conditions and change behavior/output accordingly. The part of the statement following the if is called the condition. If the condition is true, the instruction in the statement runs. If the condition is not true, it does not. The if statements are also compound statements. They have a header (if x) followed by an indented statement (an instruction to be followed is x is true). There is no limit to the number of these indented statements, but there must be at least one.

You might be interested in
The stack pop operation
lys-0071 [83]

Answer:

extracts one element from the stack and returns it

Explanation:

Basically,  a stack is an abstract data type that serves as a collection of elements. It has two principal operations:

push, which adds an element to the collection, and

pop, removes an element from the Stack and returns the removed element  This operation is often found in c and java programming.

Therefore, the correct option in our case is that the stack pop operation extracts one element from the stack and returns it.

6 0
3 years ago
Sonora wants to extend the cells to be added in her formula. what is the quickest way to add more sells?
alexira [117]
It’s D left click that’s the answer
8 0
3 years ago
Read 2 more answers
Write the function evens which takes in a queue by reference and changes it to only contain the even elements. That is, if the q
kvv77 [185]

Answer:

Explanation:

The following code is written in Java it goes through the queue that was passed as an argument, loops through it and removes all the odd numbers, leaving only the even numbers in the queue. It does not add any more data structures and finally returns the modified queue when its done.

  public static Queue<Integer> evens(Queue<Integer> queue) {

       int size = queue.size();

       for(int x = 1; x < size+1; x++) {

           if ((queue.peek() % 2) == 0) {

               queue.add(queue.peek());

               queue.remove();

           } else queue.remove();

       }

       return queue;

   }

3 0
2 years ago
8.
mario62 [17]

Answer:

<em>Lillipop</em>

Explanation:

If you have your hands correctly placed on the keyboard, the only hand needed to type the word, "lillipop", is the left hand!

<em>Hope I was of Assistance</em><u><em> #SpreadTheLove <3</em></u>

5 0
2 years ago
In which wireless configuration type do nodes communicate directly with each other, rather than with an access point?
amid [387]

Ad-hoc

Explanation:

In which wireless configuration type do nodes communicate directly with each other, rather than with an access point? In an AD-HOC network, all nodes communicate and transmit directly to each other.

6 0
3 years ago
Other questions:
  • Why is television reactive, requiring no skills or thinking
    11·1 answer
  • How is a recession determined?
    10·1 answer
  • Which of the following attacks seeks to introduce erroneous or malicious entries into a server's hostname-to-IP address cache or
    5·1 answer
  • What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
    9·1 answer
  • What are attribute grammars used for?
    8·1 answer
  • Name three types of hard drives, along with its speed and size.
    8·1 answer
  • Computer privacy typically occurs when which of the following is violated?
    6·1 answer
  • Which of the following accessories would you use to create a drawing? A. Calculator B. Notepad C. Paint D. WordPad
    14·2 answers
  • Whats wrong with my code for .addEventListener
    11·1 answer
  • In 1868 the qwerty keyboard was patented by this man
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!