1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leto [7]
2 years ago
9

Which action does not happen in each iteration of the repeat loop in the

Computers and Technology
1 answer:
iren2701 [21]2 years ago
7 0

B. The number of sharks decreases. Explanation: hope it's help i learned about it and you too

You might be interested in
Which of the following is part of the cycle of dating violence
katen-ka-za [31]

Dating violence is a pattern of behavior where one person threatens or actually use

Physical, sexual, emotional, or verbal abuse to control his or her dating partner.

Examples of physical abuse are

Hitting, shoving, kicking

Examples of sexual abuse are

touches you when you don't want them to, forces you to watch dirty things,  

intercourse, fondling, exhibitionism, voyeurism, exploitation, prostitution & exposure to body parts.

Examples of verbal and emotional abuse

Insults, belittling, name calling, blaming, humiliation & false accusations.

Abuse is a

The deliberate infliction of harm or the threat of harm to a vulnerable person

Abusers in teen dating relationships, use behaviors of

Fear and intimidation

The only person that can choose to stop the violence is the

Abused.

Signs of an abused teen

Do poorly in school, have low self-esteem, may cry frequently, & may have trouble learning.

Abused teens even contemplate or attempt

Suicide

1 in 11 teens report being victims

Physical dating violence each year.

6 0
3 years ago
What three values must be added to the ipv4 properties of a nic in order for a computer to have basic connectivity with the netw
Y_Kistochka [10]
1. The IP address

2. Subnet mask

3. Default gateway address

It’s values should be added to the NIC properties in order for the computer to have basic network connectivity. This can be done either statically or dynamically with DHCP. An additional value that should be present if the computer is to be used to connect to the Internet is the DNS server value. A computer automatically attempts to locate a DHCP server if configured to do so. A DHCP server address is not used. Finally, NAT is configured on a router, not on a computer host, and speed and duplex settings are NIC hardware settings and not IPv4 properties of the NIC.
8 0
2 years ago
What protocol is used to access directory listings within active directory or other directory services?
zalisa [80]

The LDAP protocol is used to access directory listings within active directory or other directory services.

LDAP stands for Lightweight Directory Access Protocol. The function of this protocol is to enale access to an existing direcory. LDAP is based on a client-server model.


3 0
3 years ago
How is a technical certificate like a computer-related associate degree?
satela [25.4K]

Technical certificate like a computer-related associate degree because They both provide evidence for specialized training.

<h3>What is technical certification?</h3>

Technical certifications is known to be made up of all the coursework and testing that gives one the right to claim mastery of a specific technical skill set.

Hence, Technical certificate like a computer-related associate degree because They both provide evidence for specialized training as one do need a degree to practice it.

Learn more about Technical certificate from

brainly.com/question/24931496

#SPJ1

4 0
2 years ago
What are procedures that help keep a data base current
Veseljchak [2.6K]

File maintenance supports adding, modifying, or deleting records, as well as creating backup copies of the database

5 0
3 years ago
Read 2 more answers
Other questions:
  • A decrease in the Short-Run Aggregate Supply Curve is associated with what?
    8·1 answer
  • This measures how close a biometric reading is to a prerecorded template
    11·1 answer
  • The two key elements of any computer system are the____and the _____.
    7·1 answer
  • Instructions:Select the correct answer.
    8·2 answers
  • What does the binary odometer show about representing large numbers?
    8·1 answer
  • The duties of a database administrator include determining which people have access to what kinds of data in the database; these
    13·2 answers
  • - What are the different types of clients?
    12·1 answer
  • Can someone please type a code that makes a house in python and turtle graphics i need help
    9·1 answer
  • Write 3 things that can't be done without technology.
    14·2 answers
  • A trace table is used for
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!