1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mylen [45]
2 years ago
13

A while loop should be used if you want the user to watch the same video three times.

Computers and Technology
1 answer:
Ghella [55]2 years ago
7 0

Answer:

false

Explanation:

You might be interested in
Encrypt the message ENCRYPTION using a tabular transposition cipher with encryption keyword ONE. If necessary, pad the message w
vfiekz [6]

Answer:

Encrypted message: CPONYIERTN

Explanation:

Message = ENCRYPTION

keyword = ONE

keyword ONE is of length 3 so the rows are of length 3

Permutation is given by the alphabetical order of the letters in the keyword ONE. Here E appears first in alphabet, then comes N and in last comes O so the order would be 321.

Now the message ENCRYPTION is written in tabular form with width of the rows defined by a keyword ONE

O     N     E

3      2      1

E      N     C

R      Y     P

T       I     O

N

Now this message is read by the column in alphabetic order of the keyword ONE.

Since alphabetic order of E is 1 so the column under E is read first which has the letters:

CPO

Then column under N is read which has the letters:

NYI

In the last the column under O is read which has the letters:

ERTN

So the encrypted message is:

CPONYIERTN

6 0
3 years ago
This assignment requires you to write a program to analyze a web page HTML file. Your program will read one character at a time
sattari [20]

Answer:

bro it is a question what is this

Explanation:

please follow me

3 0
3 years ago
What privacy risks do new technologies present,<br> and how do we decide if they're worth it?
vredina [299]

Answer:

Los riesgos de las nuevas tecnologías se multiplican a medida que nos hacemos dependientes de ellas. También lo hacen a medida que sustituyen a otras formas de contacto social más cercanas

Los riesgos de las nuevas tecnologías son grandes desconocidos. El mal uso de las redes sociales y de Internet en los ordenadores y en el teléfono móvil, entre otros factores, supone un peligro real para todos los estratos de población, pero en especial para los más jóvenes. Pensemos, ¿realmente somos conscientes de los riesgos que suponen las nuevas tecnologías? ¿Sabemos cómo utilizarlas para no ponernos en riesgo?

Cabe destacar que las denominadas nuevas tecnologías de la información y de la comunicación (TICs) son un distintivo de la época actual y se han convertido en herramientas esenciales en las diferentes áreas de la vida. Esto es, para el área académica, laboral, social, de ocio…

En la mayoría de los ámbitos están presentes las TICS, pues incluyen las diferentes herramientas con las que nos manejamos hoy en día: servicios de contacto electrónico (e-mails, servicios de mensajería instantánea, chats), los teléfonos móviles, tablets y ordenadores, las plataformas online de difusión de contenidos, las redes sociales, entre otros..

Explanation:

6 0
3 years ago
Jenny wants to create a résumé after a two-years gap. What should she consider?
gavmur [86]

She should consider jail time.

3 0
3 years ago
Read 2 more answers
Technological advances have made cyberbullying
Tamiku [17]

Answer:

ok

Explanation:

6 0
3 years ago
Other questions:
  • Is it just me or is brainly not working right now? I am trying to add friends and it won't let me!
    5·2 answers
  • How to access files on different computer same network
    14·1 answer
  • Which animation effects allow text or images to show movement on a slide? Check all that apply. Entrance, Emphasis, Exit, Motion
    5·2 answers
  • How do you change exposure to allow for greater DoF
    10·1 answer
  • Describe an application where a parallel circuit might work better than a series circuit.
    15·1 answer
  • For an machine using 2-dimensional even parity for error detection/correction, and the following received bytes, where is the er
    9·1 answer
  • Which of the following prefixes would be best to use when measuring your own mass?
    15·1 answer
  • Scenario
    7·1 answer
  • My phone takes forever to load the ads, does anyone else have this problem? Is there a way to fix it? I’ve tried getting another
    12·2 answers
  • How to make a Java GUI application? Discuss each step needed.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!