1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
2 years ago
5

Sample program for Do While loop Qbasic

Computers and Technology
2 answers:
Ganezh [65]2 years ago
7 0

Answer:

A "Do While" loop statement runs while a logical expression is true.

Explanation:

This means that as long as your expression stays true, your program will keep on running. Once the expression is false, your program stops running. A "Do Until" loop statement runs until a logical statement is true.

kap26 [50]2 years ago
4 0

Answer:

A "Do While" loop statement runs while a logical expression is true. Explanation:

You might be interested in
When you ____ an exception, you send a message that an error has occurred to another part of the program.
jekas [21]
The correct answer is most definitely B
8 0
3 years ago
Read 2 more answers
In a non-formatted/standard template, if the number 25 is converted to text format, the
goldfiish [28.3K]
<h2>The alignment of the text will be "left" by default</h2>

Explanation:

  • In Excel or spreadsheet, if any number is entered, it will automatically be aligned to right because right alignment is preferable for the numbers.
  • In case of any alignment is mentioned in the cell in prior to entering text or if the type of data is changed after or before entering the text, then the text is aligned accordingly.
  • According to the given scenario, a number "25" is entered and it is converted to text. So a text format will preserve the alignment as entered. By default it will be "left" aligned.

3 0
3 years ago
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this
jarptica [38.1K]

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

6 0
3 years ago
Alexandria works for a non-for-profit company that asks for donations to help the homeless people in her community. Recently the
irakobra [83]

Answer:

Option A.

Explanation:

7 0
3 years ago
Consider sending a 2400-byte datagram into a link that has an mtu of 700 bytes. suppose the original datagram is stamped with th
Feliz [49]

Explanation:

Let, DG is the datagram so, DG= 2400.

Let, FV is the Value of Fragment and F is the Flag and FO is the Fragmentation Offset.

Let, M is the MTU so, M=700.

Let, IP is the IP header so, IP= 20.

Let, id is the identification number so, id=422

Required numbers of the fragment = [\frac{DG-IP}{M-IP} ]

Insert values in the formula = [\frac{2400-20}{700-20} ]

Then,        = [\frac{2380}{680} ] = [3.5]

The generated numbers of the fragment is 4

  • If FV = 1 then, bytes in data field of DG= 720-20 = 680 and id=422 and FO=0 and F=1.
  • If FV = 2 then, bytes in data field of DG= 720-20 = 680 and id=422 and FO=85(85*8=680 bytes) and F=1.
  • If FV = 3 then, bytes in data field of DG= 720-20 = 680 and id=422 and FO=170(170*8=1360 bytes) and F=1.
  • If FV = 4 then, bytes in data field of DG= 2380-3(680) = 340 and id=422 and FO=255(255*8=2040 bytes) and F=0.

3 0
3 years ago
Other questions:
  • It is a good idea to use more than one typeface in a document when _____.
    8·2 answers
  • Digital cameras are less susceptible to UV light.Select one of the options below as your answer:A. TrueB. False
    15·2 answers
  • Fundamental types of data, such as strings, integers, and real numbers, are known as
    5·1 answer
  • Which of the following is not a general strategy for organizing and analyzing qualitative data?a.Convert the data into one or mo
    6·1 answer
  • Write a loop that continually asks the user what pets the user has, until the user enters "rock", in which case the loop ends. I
    12·1 answer
  • 0.005098 megaliters to liters. record your answer in whole liters
    7·1 answer
  • What is the output of this program? Assume the user enters 2, 5, and 10.
    6·1 answer
  • Two types of are desktop computers and notebook computer
    11·2 answers
  • What is Japanese tradition?
    8·2 answers
  • The New option is found in the ...............tab.​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!