1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phantasy [73]
2 years ago
15

A example of an "ITERATIVE STATMENT"

Computers and Technology
1 answer:
timama [110]2 years ago
7 0

Answer:

for(let i = 0: i <=5; i++) {

console.log(I)

}

Explanation:

An iterative statement repeats a body of code until the condition is not true. Here we declare an integer (i) and make it 0. Then the loop checks if the second part is true (i is less than or equal to 5), and if it is true, it executes the code inside the loop body, which logs i, and finally runs the last past, which increments i by one. When the second part becomes false, the loop exits.

You might be interested in
Where does an MPLS label go in a PDU?
Natalija [7]

Answer: Between Layers 2 and 3

Explanation:

In between Layer 2 and Layer 3 the MPLS header is present and is known as Shim header. It is also said to be in 2.5.

6 0
3 years ago
Mary is a big fan of tropical fish. She has a few tanks of fish at home. To maintain a healthy environment for the fish, she nee
astra-53 [7]

Answer:

Answered below

Explanation:

# Program is written in Python programming language

conditioner_in_ml = 0

width = float(input("Enter width in inches: "))

height = float(input("Enter height in inches: "))

length = float (input("Enter length in inches: "))

#Calculate the volume

volume = width * length * height

#Calculate the amount of conditioner per 100 #cubic inches of volume

conditioner_in_ml = volume/ 100

print("The amount of conditioner required for $volume cubic inches is $conditioner_in_ml ml")

7 0
2 years ago
By far, the largest social network for gaming is:answer twitter. linkedin. myspace. facebook. youtube
Firdavs [7]
<span>By far, the largest social network for gaming is Facebook. The correct option among all the options that are given in the question is the fourth option or the penultimate option. Facebook is also the most popular social networking website around the world. I hope that this is the answer that has come to your help.</span>
7 0
3 years ago
A (n) _____, similar to a trojan horse, installs monitoring software in addition to the regular software that a user downloads o
galina1969 [7]

Answer:

Spyware

Explanation:

Internet is a type of computer network that allow device communicate with each other world wide. So, it is not the correct option.

Worm: this is a standalone malware computer program that replicates itself in order to spread to other computers. It spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. The major feature of a worm is ability to replicate on it own. So, it is not the correct option.

Bot: this is a software application that runs automated tasks. So, it is not the correct option.

Middleware: this is software that lies between an operating system and the applications running on it, enabling communication and data management. It provides services to software applications beyond those available from the operating system. So, it is not the correct option.

Spyware: this is the correct answer. Spyware is similar to trojan horse because it hides itself in a system and a user may not know that it exist on the system. Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information without knowledge of the user.

5 0
3 years ago
Read 2 more answers
Q9. Complete the table with the name of the functions
umka21 [38]

Answer:

1. VLOOKUP function.

2. SUMIF function.

3. COUNT function.

4. IF function.

5. HLOOKUP function.

Explanation:

Microsoft Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents. There are different types of functions used in Microsoft Excel to perform specific tasks and these includes;

1. VLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized vertically. Thus, it's typically used for searching values in a column.

2. SUMIF function: it is an Excel function to sum cells that meet criteria such as text, dates and numbers. This function can be used with the following logical operators; <, >, and =.

3. COUNT function: it's an Excel function to find the total number of entries in a column. For example, to count the number of entries in B1:B15; COUNT(B2:B15).

4. IF function: runs a logical test and returns one value for a TRUE result, and another for a FALSE result. For example, to fail scores that are below 40; IF (A1 < 40, "Fail", "Pass").

5. HLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized horizontally. Thus, it's typically used for searching values in a column.

4 0
3 years ago
Other questions:
  • A ________ -tier design includes a middle layer between the client and server that processes the client requests and translates
    11·1 answer
  • Which of the following is NOT an option in the comments group
    12·1 answer
  • Kellyn needs to move Slide 8 of his presentation up so that it becomes Slide 6. What best describes how he can do this using the
    13·1 answer
  • A(n) ____ is a request for specific data from a database.
    9·1 answer
  • Gaven's instructor told him to include a personal statement in his work portfolio. Why did his instructor recommend including a
    8·1 answer
  • Help!!!! ASAP TIMED TEST 50 points!!!!
    7·1 answer
  • Discuss two basic types of monitors CRT and LCD give me in short ​
    9·2 answers
  • Group of answer choices When declaring a variable, you also specify the type of its values. Variables cannot be assigned and dec
    7·1 answer
  • True or false? To help improve SEO, your URL should match the title of your blog post, word for word.
    12·1 answer
  • When network traffic is encrypted, it is invisible and its content and purpose are masked.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!