This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.1. do-while2. while3. for4. infinite5. None of these

Answers

Answer 1

Answer:

Option 3 is the correct answer.

Explanation:

In c, c++ or Java programming language, The for loop takes three parameters in which first is an initialization, second is condition check and the third is an increment. None of the other loop (except for loop) takes three parameters. The other loop takes only one parameter and that is the condition check.So when a user knows about the times of iteration then it is a good choice to use the for loop but when the person does not know about the times of iteration if the loop. It means the iteration of the loop is based on the condition then it is a good choice to chose while or Do-while loop.The above question wants to ask which loop for a user can best if he familiar with the iteration of the loop then the answer is for loop which is started from option 3. Hence Option 3 is the correct answer while the other is not because--Option 1 states about the do-while loop which takes condition only.Option 2 states about the while loop which also takes condition only.Option 4 states about the infinite loop which is not any loop.Option 5 states about none of these which is not correct because option 3 is the correct answer.

Answer 2
Final answer:

A for-loop is the ideal choice when the number of iterations is known before entering the loop because it allows you to set the exact number of iterations in advance.

Explanation:

The loop that is a good choice when you know how many times you want the loop to iterate in advance of entering the loop is the for-loop. For-loops are structured to repeat a block of code a specific number of times, and this is established by setting the conditions of the loop before it starts running. In contrast, while-loops execute based on the truthfulness of a condition and are better suited when the number of iterations is not known beforehand. Do-while loops are similar to while-loops but will always execute at least once, even if the condition is false from the start. An infinite loop is a loop that does not have a condition that evaluates to false, thereby running indefinitely, which is usually not desired. For-loops in most programming languages are defined using the keywords for ... in and an iterator variable.


Related Questions

If the name of the input file was in a variable named filename, which of the following is the correct way to open the input stream named inFile and associate it with this file?
a. inFile.open (filename);
b. inFile = filename;
c. inFile = "filename";
d. inFile.open ("filename");

Answers

It would be A - inFile.open(filename)

Which of the following statements are true? Select all that apply.A. Since ObjectInputStream/ObjectOutputStream contains all the functions of DataInputStream/DataOutputStream, you can replace DataInputStream/DataOutputStream completely by ObjectInputStream/ObjectOutputStream. B. If all the elements in an array is serializable, the array is serializable too. C. To write an object, the object must be serializable. D. ObjectInputStream/ObjectOutputStream enables you to perform I/O for objects in addition for primitive type values and strings. E. The Serializable interface does not contain any methods. So it is a marker interface.

Answers

Answer:

Correct options are A, B, D, E

Explanation:

For option A, D, E:

reference :Book: Object Oriented Programming with Java

chapter 5 and section 5.4 Object I/O

for option 'C' it incorrect statement because to write an object it is not necessary to be serialize.

for option B it is correct because if all attributes of array having type T then we can say array is of type T implying the same statement for serialization.

Which of the following statements is incorrect? Group of answer choices
a.Printer resolution is measured in dpi (dots per inch).
b.Printer output is often called hard copy.
c.Memory within a printer is used to store printing instructions and documents waiting to be printed.
d.Printer speed is measured in the number of words printed per minute.

Answers

Answer:

d. printer speed is measured in the number of words printed per minute                                                                                  

Explanation:

a. Printer resolution is measured in dots per inch. So a. is true. Dots per inch means number of ink dots that are printed on the paper by a printer. Higher resolution means better image that is printed.

b. Hard copy also called a print out is the information in the computer which is printed on the paper by a printer. So b. is also true.

c. A printer has memory which is used to store information about the print jobs, print logs, scans. Print jobs are basically the documents which are to be printed these jobs are removed from memory after the printing task is done. So c is also true.

d. Printer speed is measured in pages printer per minute instead of number of words printed per minutes so option d. is incorrect. For example a laser printer can print up to 20 pages of text per minute.

High-end tools in project management software have enterprise and _____ functions that summarize and combine individual project information to provide an enterprise view of all projects.

Answers

Answer:

Portfolio management  is the correct option.

Explanation:

Project management software is that type of software that is used to accomplish the management related works such as planning, organizing, summarizing and many other works related to the management.

So, project management software is used for functioning the enterprise and portfolio management functions by which the employee combines and summarizes project information.

_______ is a process that insures that operations meet data validity standards. For instance, information systems that process checking accounts will only allow unique check numbers for each transaction—and reject duplicates.

Answers

Answer:

The answer is consistency

Explanation:

Information systems deal with the retrieval, storage, manipulation and sharing of data for organisational needs. It is important that there are measures in place that corresponds to data validity standards. The process that ensures that operations meet these standards is known as consistency.

This is very necessary for information systems.

A ____ is an e-mail attack in which the attacker routes large quantities of e-mail to the target system hoping to overwhelm the target with so much irrelevant email that legitimate email cannot be used.

Answers

Answer:

Mail bomb is the correct answer.

Explanation:

In the following statement, A mail bomb is the type of attack on e-mail of the particular person by which the attacker transfers large quantities of e-mail to the target computer in the expectation of flooding the target with so much meaningless e-mail that legitimate e-mail is not accessible. So, that's why the following answer is correct.

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but often requires a fee for support, training, or added functionality.Trure/false

Answers

Answer:TRUE

IT IS AN OPEN SOURCE SOFTWARE

Explanation:AN OPEN SOURCE SOFTWARE is a software which is made to accessed free of charge,no lincense is required for the use of the software. This type of softwares are usually developed to help the users which may be students or for religious purposes or for vunerable persons whom the developer feels should have access to the software. The only fee required is for maintenance or for other special features. GOOGLE'S ANDROID OPERATING SYSTEM is considered as an open source software.

It is false statement. The statement about a software licensing model allowing free distribution but potentially charging for support or additional features refers to open source software. While open source provides freedom to share and modify software, it does not guarantee that the software is free of cost. GPL-licensed open source software ensures users have the right to modify and distribute software, but may not always profit from these actions.

One software license model that permits software to be freely distributed, downloaded, and installed without a license fee but may require a fee for support, training, or added functionality is true to the open source software model. Open source software grants users the freedom to access, edit, and distribute the source code. However, open source does not necessarily mean the software is free of cost; while you can use the software without paying for it, there might be charges for additional services.

When we discuss free software, such as the software licensed under the GNU General Public License, we are referring to the freedom to share and change the software. The concept of "free" in this context is about liberty, not zero price. Developers using the GNU GPL protect your rights by allowing you to copy, distribute, and modify the software according to these terms.

It is important to note that users can change the software and they also can distribute their modified versions. However, if users distribute their modified versions, the GPL requires that these versions are also licensed under the GPL. Users are not always able to profit from selling their versions of the software, as the main idea behind this licensing is to ensure the software remains free and open for everyone's use.

A constructor is a method that
Select one:
A. removes the object from memory.
B. returns an object of the class.
C. never receives any arguments.
D. performs initialization or setup operations.

Answers

Answer:

A constructor is a method that performs initialization or setup operations.

Explanation:

A constructor is a special method that is immediately called just after a memory space as been allocated to an object or when an instance of the class is created.

Constructors perform initialization or setup operations, such as assigning initial values to instance Variables. They are called "constructors" because they assist in constructing an object even though they actually don't construct the object.

Final answer:

A constructor is a method in object-oriented programming that initializes an object's state or performs setup operations. It is defined within a class and typically has the same name as the class.

Explanation:

A constructor is a special method in object-oriented programming that is used to initialize an object's state or perform setup operations when the object is created. It is typically defined within a class and has the same name as the class. Constructors can take arguments or parameters, allowing for customization and initialization of objects based on specific values.

For example, let's consider a class called 'Car' in a car dealership system. The constructor of the 'Car' class could be used to set initial values for properties such as 'make', 'model', 'year', and 'mileage' when a new 'Car' object is created.

Learn more about Constructors here:

https://brainly.com/question/33443436

#SPJ6

_____ is a program that allows a person using one computer to access files and run programs on a second computer that is connected to the Internet.

Answers

Answer:

Remote Access Software.

Explanation:

Remote Access Software

Remote access software is a type of software installed on local computer or can be deployed over the network/Internet on a Remote Access Server.

This allows a local user to access files on one or more remote devices over a network or an internet connection.

Remote access software works by creating a connection between a local and remote device over a network or through an Internet connection.

A user can access data, download files and perform installations in remote device over a server. The local user undergoes authentication, before access is granted by a Remote Access Server.

Example of a Remote Access Software;

Teamviewer, Chrome Remote Control etc.

Rasheed is memorizing his multiplication tables by using flash cards. He does this frequently enough that eventually he does not need the visual stimulation of the cards to remember his times tables for a test. Rasheed is then taking advantage of __________ memory

Answers

Answer:

Long-term memory

Explanation:

There are two common types of memory - Long-term and short-term.

In short-term memory, information are stored just for a very short time before they are eventually discarded or transferred to the long-term memory. It is sometimes called working memory. For example, short-time memory can be used to remember that a particular event is going to be by 12pm today. After the event, the information might either be discarded or pushed to the long-term memory.

In long-term memory, information are stored for a very long term, almost permanently. For example, long-term memory enables you to remember an event that has taken place in the past. In the case of Rasheed, he has so much learned the multiplication tables in such a way that information on the tables have been stored indefinitely in a part of his brain called hippocampus. Every time he needs the multiplication tables, they are always available. So he is already taking advantage of the long-term memory.

Answer:

top answer should be correct.

Explanation:

You are attempting to install Windows Server 2016 on a SCSI based disk, but the installation program does not find the disk. What is the most likely cause:________.

Answers

Answer:

Windows Server 2016 requires a driver for working with the SCSI controller.

Explanation:

Based on the information provided within the question it can be said that the most likely cause in this scenario is that Windows Server 2016 requires a driver for working with the SCSI controller. Therefore in order to solve this problem you would need to, manually update the driver for the SCSI adapter in the virtual machine that is going to be using the Windows Server 2016 software.

You have informed your users that you need to bring the machine down at the end of the day to perform routine maintenance. However, prior to shutting the system down, you want to give users fifteen minutes to save data and exit the system. In this lab, your task is to shut the machine down and warn your users as follows:______
A. Use a 15-minute delay before shutting down.
B. Use It is time for a shutdown! as a message to all logged-in users.

Answers

Answer:

shutdown -h +15 It is time for a shutdown!

Explanation:

In a work environment where there is an admin and users connected to the server when the admin wants to Give a 15-minute delay to allow users enough time to save their work data and logout from the system. the command above shuts down after 15 minutes delay and notifies the user with "It is time to shut down!".

Computers and communication systems use _____ to represent information between computers and network systems.

Answers

Answer:

Data Code

Explanation:

In Data Communication, Data and Information are being assigned binary code in a digital system. This process is known as encoding system. This binary code helps computer of different architecture communicate with one another.

Data code is an encoding system for data in a computer. For text encoding we have ASCII, 7-bit ASCII, EBCDIC and Unicode. For non-text encoding, we have MIME, BinHex, Codec, etc. For video encoding, we have MPEG, YUV, YCbCr, chroma, e.t.c.

Computers and communication systems use **binary code** to represent information between computers and network systems. Binary code consists of two symbols, typically 0 and 1, which are used to encode data. This binary representation is fundamental for digital computing and communication, enabling the processing, storage, and transmission of information.

Computers and communication systems use **binary code** to represent information between computers and network systems. Binary code is a system of representing text or computer processor instructions using the binary number system's two binary digits, 0 and 1. This system forms the basis of all modern computing processes.

In binary code, each digit is referred to as a bit. These bits are grouped together to form bytes, typically consisting of eight bits. Bytes can represent a wide variety of data types, including characters, integers, and more complex data structures.

The primary advantage of binary code is its simplicity. Digital systems only need to distinguish between two states, which can be easily represented by electrical signals (on/off, high/low voltage). This reduces the complexity and cost of hardware.

Additionally, binary code enables reliable error detection and correction. Techniques such as parity checks and cyclic redundancy checks (CRC) ensure data integrity during transmission across networks. This binary representation is fundamental for digital computing and communication, enabling efficient processing, storage, and transmission of information across various platforms and devices.

The common denominator for decisions on service processes is​ _______, but for manufacturing processes it is​ _______.A. customer​ contact; product varietyB. customer​ variety; output volumeC. customer​ contact; output volumeD. customer​ variety; product variety

Answers

Answer:

Option C i.e., customer​ contact and output volume is the correct answer.

Explanation:

Customer contact is required for processes the decisions on the service through the common denominator because the customer contact is always required for increasing the business services and products by which their business gain high profits. Output volume is required for the process of manufacturing.

In most modern implementations of the JVM, bytecode is Select one: a. input to the Java compiler b. ready to be executed by a Windows system c. output from the Java interpreter d. input to the JIT (just-in-time) compiler

Answers

Answer:

Option d is the correct answer to the above question.

Explanation:

Java is a programming language that gives the features to write the program in one platform and execute it on multiple platforms. The machine code is not given features like this. So for this, the java derived a class file which is then converted file of the java program which is also called the byte code. This code can be transferred on multiple machines and then excite after get converted into machine code. So to convert the byte code into machine code the java needs a JIT compiler which takes inputs as byte code and gives the output as machine code.

The above question asks that which take input as byte code then the answer is JIT which is defined as above and it is stated from option d. hence option d is the correct answer. while the other is not because--

Option 'a' states about the java compiler which gives the output as byte code.Option b states about the window system which is not the correct option.Option c states that it is the output of the interpreter but the interpreter gives the output as machine code in java language.

What do you call a group of pins on a motherboard that are used to connect parts of the computer to the motherboard for power or data transfer.a. Socketb. Headerc. Jumperd. Port

Answers

Answer:

D. Port.

Explanation:

In the computer system motherboard, a socket is a connector used to connect the processor. Headers are connector used to clear the RTC. Jumpers are cable connectors used to connect components on the motherboard. The port is a connection point in the motherboard, that connects external or peripheral devices to the motherboard for power and data transfer.

Random access memory is the portion of a computer's primary storage that does not lose its contents when one switches off the power.True / False.

Answers

Answer:

False

Explanation:

It is of importance to note that a Random-access memory is a form of computer memory that can be read and changed in any order , in other words, modified, typically used to store working data and machine code. A random-access memory device allows data items to be read or written in almost the same amount of time irrespective of the physical location of data inside the memory.

Write a method called fact that recursively calculates the factorial value of its single int parameter. The value returned by fact is a long ..

Answers

Answer:

The program to this question can be given as follows:

Program:

//class

public class factorial //defining class

{

//method fact

public static long fact(int x1) //defining method fact

{

//conditional statement

if (x1 <= 1) //if block checks parameter value less then equal to 1

{

return 1; //return value

}

else //else part

{

return (fact(x1 - 1) * (long) x1); //return factors using recursive function

}

}

//method main

public static void main(String[] args) //defining main method

{

long data=fact(5);//defining variable that holds function value

System.out.println("Factorial is: "+data); //print value

}

}

Output:

Factorial is: 120

Explanation:

In the above java program, a class is "factorial" is defined, inside the class, a static method "fact" is declared, that accepts an integer parameter that is "x1" and returns a long value, inside this method a conditional statement is used.

If the block it checks parameter value is less then equal to 1, if this condition is true, it will return 1 when this condition is not true. It will go in else part.In else part, it uses a recursive function to calculate factorial of a number and return its value.Then the main method is defined, inside this method a long variable "data" is defined, that call and holds fact function return value, and in the next line, the print function is used to print the data variable value.

Computer ________ involves identifying, extracting, preserving, and documenting computer evidence. a. inoculation b. forensics c. hacking d. multi-factor e. authentication

Answers

Answer:

b. forensics

Explanation:

Digital Forensics: It is the process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law.

Virtualization occurs when a ________________ running specialized software creates environments within unique single files that _______________ other computers.
a) single computer; manages
b) database; manages
c) database; replicates
d) single computer; replicates

Answers

Virtualization occurs when a single computer running specialized software creates environments within unique single files that replicates other computers.

What does virtualization means in computing?

The term Virtualization is a term that connote the method of running a virtual work of a computer system by a layer that is gotten from the actual hardware.

Note that it entails the running of different kinds of operating systems on a computer system at the same time.

Learn more about Virtualization from

https://brainly.com/question/11788301

An insulated anti-short fitting required to be installed in the ends of Type AC cable to protect the wires from abrasion is typically called a(n) __________.

Answers

Answer:

Red head

Explanation:

Type AC or Armoured cable is a cable with very thick insulation and few conductors used in power networks to transfer very high voltage of 11kva to 33kva.

It is installed with several number of conductors in its cable.

Installing the type AC cable requires an insulated anti-short fitting to be installed at the end of the cable, which is called a red head, to protect the cable from abrasion.

The term ____ means that a public information network such as an Internet service provider (ISP) should treat all users, all platforms, and all content equally.

Answers

Answer:

Domain Name System

Explanation:

The Domain Name System is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities

Your environment includes many users who print documents often. A single print device isn't sufficient. You need a "printer pool" to accommodate all the concurrent print jobs. How would you accomplish this advanced printing configuration?

Answers

Answer:

By connecting a printer to many print devices

Explanation:

By connecting one printer to many printer allows all the printers connected to act as one single printer this technique is called "pooling", this helps when the print work is so heavy that one printer can't possibly handle. This feature is available in Windows 7 Operating system and other windows computers, this technique is used when there are many computers in the office and this improves productivity.

Information from the system that is used to make modifications in the input, processing actions, or outputs is referred to as: Group of answer choices A. Reporting B. Feedback C.Acquisitions D.Processing

Answers

Answer:

D

Explanation:

The processing software helps you to run such activities on a computer device. As you key in the essay on the keyboard, it appears on the screen in front of you. After you examine the essay on the screen, make changes, and determine that it suits your desired content, you can save it using a strorage device

Answer:

B. Feedback

Explanation:

Apart from the four basic functions of the Information system - input, process, output, store - the feedback function is also very important.

Feedbacks are ideas, suggestions, impressions, critics and even criticisms that are being got from users of a system. With feedback, information can be got to be used to make modifications in the input, processing actions, or output.

Feedback will also allow to rebuild and/or revisit an existing system and even allow businesses to make tangible, logical and positive business decisions.

Type two statements that use rand() to print 2 random integers between (and including) 100 and 149. End with a newline. Ex: 101 133 Note: For this activity, using one statement may yield different output (due to the compiler calling rand() in a different order). Use two statements for this activity. Also, srand() has already been called; do not call srand() again.

Answers

Answer:

srand(time(NULL));   //using srand once

cout<< (rand()%50)+100;   // first random number

cout<<endl;      //new line

cout<< (rand()%50)+100;   //second random number

Explanation:

The srand function in C++ seeds the rand function. It means that the srand function provides rand function with a number which is used by the random function to generate random numbers.

The directory partition holds configuration information that can affect the entire forest, such as details on how domain controllers should replicate with one another.
True / False.

Answers

Answer: True

Explanation:

A directory partition is a partition that contains active directory objects, which is part of the forest's Domain Name System (DNS) namespace, and is replicated among domain controllers (DCs).

It is a contiguous portion of the overall directory that has independent replication scope and scheduling data. A directory partition is also known as naming context.

Swee Yin's fashion-apparel department store runs a popular biannual sale on men's hats, with large discounts and surprise bonus items. She wants to tailor her Google Search campaign to highlight this sale. How can Google Search campaigns be tailored to promote her company's sales event?

Answers

Answer:

By designing a fresh ad group for the particular sale

By setting time the campaign starts and finishes

Explanation:

Creating an ad group is necessary to make Swee Yin's products appear on search results when users search for related items on Google search engine, this will promote Swee Yin's sale event even though a payment will be made to that effect to run the google ad campaign and setting the start and end date of the campaign is necessary because you will not need your ad still displaying when the sale event is over.

During the Cold War, defense contractors were required to shield sensitive computing systems and prevent electronic eavesdropping of any computer emissions. The U.S. Department of Defense calls this special computer-emission shielding ____.

Answers

Answer:

Tempest

Explanation:

Which are types of Internet connections? Choose three answers.
Cable
HDMI
DSL
HTML
Fiber

Answers

Answer:

Cable

DSL

Fiber

Explanation:

HDMI is a digital video signal format

HTML is the webpage markup language

cable, HDMI, & HTML i believe.

Which of the following forms of wireless security is easily cracked?
a. WEP
b. WPA
c. WPA2
d. IPsec

Answers

Answer:

The answer is "Option a".

Explanation:

The full of WEP is "wired equivalent privacy", which is available on an IEEE network project 802.11b, that allows you to provide security and privacy in the Local wireless networks, but it is easy to crack, WEP because it only protects the wireless network against ordinary users, and other options were not correct, that can be described as follows:

In option b, It is used for data encryption which is better than WEP security, that's why it is not correct.In option c, It is an upgraded version of WPA, that's why it is not correct. In option d, It is a security service, which is used in communication, that's why it is not correct.

Other Questions
If someones boss wanted to send a message to an employee that contains both a video and a Word processing document, which Internet service would be the most appropriate for her to use?\ help.. Mike has a recipe that feeds one person that calls for 3/8 teaspoon of salt. How much salt is needed to make the recipe if he needs to cook the recipe for 8 people? a. 3/64 teaspoon c. 24/64 teaspoon b. 1 3/8 teaspoons d. 3 teaspoons Nicole tells her gynecologist that lately, she has had no sexual desire. Nicole and her gynecologist discuss the possibility of using a hormone patch to address her sexual dysfunction. This hormone patch likely uses which hormone?a. testosteroneb. estrogenc. progesteroned. follicle stimulating hormone How long can hives last when you're in a medical condition? The bar graph shows changes in price of regular gasoline each year from 1996-2010. For example, at the end of 1996, the price per gallon for regular gasoline was $0.15 more than the price per gallon at the end of 1995. The price at the end of 1997 was $0.12 less than the price at the end of 1996, and so on. evaluate 1/2a^-4b^2 for a =-2 and b=4 What are primary and secondary markets? A female client with the beta-thalassemia trait plans to marry a man of Italian ancestry who also has the trait. Which client statement indicates that she understands the teaching provided by the nurse? Just answer in five-line. Question: Green Field county stadium is planning to conduct a cricket match between two teams A and B. A large crowd is expected in the stadium as 10000 tickets have already been sold. To fulfill the viewers requirements, the match administrators are willing to install large display screens inside the stadium which should display the match Live through several cameras installed on different angles in the stadium.?most suitable serial transmission mode with two strong reasons. Find the area of the trapezoid 36mm by 15mm by 14mm. (m+3n)8 plz help me now Water molecules have one oxygen atom that is more electronegative than the two hydrogen atoms bound to it. As a result, which type of bonding holds water molecules together?A) non polar covalent bondingB) polar covalent bondingC) ionic bondingD) hydrogen bonds Using basic programming (for loops, while loops, and if statements), write two MATLAB functions, both taking as input: - dimension n; - n x n matrix A; - n x n matrix B;-n 1 vector x. Have the first function compute ABx through (AB)x and the second compute ABx through A(Bx). Have both output: - the number of flops used. (a) Print out or write out the first function. (b) Print out or write out the second function. (c) Apply both your functions to the case with random matrices and vectors for n = 100 and print out or write out the results. Do the same for 200 x 200, 400 x 400, and 800 x 800. Which approach of computing ABx is faster? An aircraft seam requires 22 rivets. The seam will have to be reworked if any of these rivets is defective. Suppose rivets are defective independently of one another, each with the same probability. (Round your answers to four decimal places.) (a) If 19% of all seams need reworking, what is the probability that a rivet is defective? (b) How small should the probability of a defective rivet be to ensure that only 9% of all seams need reworking? What was a major concept in Enlightenment thinking?A. Logical reasoningB. Divine right of kingsC. Religious enthusiasmD. Authority of the Bible Referring to King's letter from Birmingham Jail, how does this letter help summarize the atmosphere in Birmingham in the early 1960s. By making inferences based on analysis of a character, the reader is able to determine a character's Jami lost her debit card. She did not report it missing for 3 months. If an unauthorized person used her debit card, her maximum liability is: Which type of economist views economic systems as subsystems of the biosphere that depend heavily on irreplaceable natural resources? Di si la siguiente oracin es cierta o falsa.En una cena tpica, puedes comer cosas que tienen origen en Europa con otras cosas que tienen origen en las Amricas en un solo plato.TrueFalse Steam Workshop Downloader