Which type of loop is best if you do not know how many times you need the loop to run?

Answers

Answer 1
while:  the loop must repeat until a certain "condition" is met.  If the "condition" is FALSE at the beginning of the loop, the loop is never executed.  The "condition" may be determined by the user at the keyboard.  The "condition" may be a numeric or an alphanumeric entry.  This is a good, solid looping process with applications to numerous situations. 
while:int ctr = 1;
while (ctr < = 20)
{
     cout<< ctr++ <<"\n";
}



HOPE i HELPED! brainliest? :D 

Related Questions

To change the overall design of an entire document to include colors, fonts, and effects, a user should apply a _____.

Answers

To change the overall design of an entire document to include colors, fonts, and effects, a user should apply a theme.

What are the characteristics of a theme?

The characteristics of the theme are as follows:

A theme may be defined as a combination of desktop background pictures, window colors, and sounds. It is used to determine the visual appearance of all windows, applications, dialogs, panels, and applets. It completely demonstrates the visual interface to the items that appear on the window.

The theme can be utilized in order to change the complete design of an entire document to include colors, fonts, and effects. Sometimes, themes are modified according to the need and interests of the user. They possess specific properties in the computer and technology.

Therefore, a user should apply a theme when he/she wants to change the overall design of an entire document to include colors, fonts, and effects.

To learn more about Theme, refer to the link:

https://brainly.com/question/26624021

#SPJ6

Raul looks at different technologies that will help him do his job. What part of the process is this?

analyzing options
determining the goals
evaluating the decision
gathering data

Answers

This process is known as analyzing options. When Raul looks over different options and/or technologies that will help him do his job, he is going over the different options and seeing which option is best for him. When deciding which is best for him, he will need to consider: what Raul needs it to complete, how each technology option compares to the next, the price point and all of the functions the technology can do. After he figures out what it can do compared to what purpose he needs it to serve, he can determine the best option for himself.

This portion of the process is actually called gathering information.

I tried the other option on Odesseyware and got it incorrect.

I hope this helps!

When using an online media source, students should ensure the information is

Answers

viable and true. hope this helps!
relevant, credible, and valid.

Why would you use the ‘assign to me' function in the drop down menu of an incoming message?

Answers

Socially, it is an important step for entering the message into an approvals queue. It is also an easier way to remind yourself to make a response later to that social message you received. One can only assign a message to other team members and vice versa.






Presentation aids should include short phrases or images to convey your message. True False

Answers

True

Other than words of speech, presentation aids are items used to support what the speaker is relaying. They can be visual or audio aids or other technologies that are supported. Highlighting new points with appropriate and short phrases, rather than complete sentences is important to a good presentation aid.
Images or photographs on the other hand provide a picture of reality and are used to illustrate a point, action, or evoking an emotion. It shows an important but an unfamiliar detail.  




When you see a blank pointer this means you can drag the row or column border to change height or width

Answers

No, you would see arrows pointing in opposite directions <--> like so

On the attendance worksheet, in cell l5, enter an if function to determine if the percentage in cell k5 is greater than or equal to the goal in cell h18. the function should return the text goal met if true and review if false. set the reference to cell h18 as an absolute reference

Answers

You have tot do these steps:
Ribbon
1.Click cell L5. On the FORMULAS tab, in the Function Library group, clickthe Logical, and then click IF.
2.In the Function Arguments dialog box, with the insertion point in the Logical_test box, type K5>=$H$18.
3.Press TAB to select the Value_if_true box.
4.Type Goal Met.
5.Press TAB to select the Value_if_false box.
6.Type Review.
7.Click OK.

Keyboard
1.Click cell L5, and type =IF(K5>=$H$18,"Goal Met","Review") (or =if(k5>=$h$18,"Goal Met","Review") or =IF($H$18=0.8,"Goal Met","Review") or =if(k5>=.80,"Goal Met","Review") or =IF(0.80
2.Press ENTER (or TAB or CTRL+ENTER or click the Enter button to the leftof the Formula Bar).

Keyboard (2)
1.Click in the Name box, type l5 (or L5), and then press ENTER. type =if( (or =IF( or =If().
2.Click cell K5, and then type >=.
3.Click cell H18, press F4, and then type ,"Goal Met","Review".
4.Press ENTER (or TAB or CTRL+ENTER or click the Enter button to the left of the Formula Bar).

How do you make a tip calculator out of code. getting the cost of 3 guests food and the tip % and calculating the total bill.

Answers

You have to multiply 3 costs of food by 3 then you multiply it by the % of tip.

Coordinates that measure how far a point is from the origin are _______________. A. Relative coordinates B. Absolute coordinates C. Negative coordinates D. X coordinates

Answers

the correct answer is B

Answer:

answer b

Explanation:

"explain why professional software is not just the programs that are developed for a customer"

Answers

To put it into simple terms, software is always a continuous process of coding and updating, thus, you will never code and be done. Professional software not only consists of programs that are developed for a client, but also the compilation of documentation, configuration of data, support websites, requirements, design manuals, and evolution to make these programs operational and complete. 

A professionally done software system consists of more than one program and configuration files used to set up these programs.






Which theory uses game playing to understand the development of self?

Answers

Mead's role-playing theory uses game playing to understand the development of self.
According this theory game is one of the three activities through which the self is developed, The other two are language and play.  Through these activities people interact with other people and  develop self-images.

A group of scientists are working on research. All of them need to simultaneously work on the computer and perform different operations. Which operating system do they need to use?

Answers

probably windows 10 because you can have more than one desktop on the same computer.i hope this helps!

How can you tell the difference between subnet addresses and interface addresses?

Answers

The network interface address is an network address  that belongs to an interface and defines that interface in the network. Any device with an IP Address, has an IP Address on an interface. The subnet address (or subnet mask) on the other hand defines the routing prefix of an address and divides the IP address into network and host addresses. 
There can be same subnet addresses, but the interface address must be unique defined.
Final answer:

Subnet addresses are used to divide a network into smaller subnetworks, while interface addresses are used to identify specific devices or interfaces on a network.

Explanation:Difference between subnet addresses and interface addresses

In networking, subnet addresses and interface addresses serve different purposes.

A subnet address is used to divide a large network into smaller subnetworks, allowing for better organization and management of network resources. It is a range of IP addresses that share the same network prefix and subnet mask. For example, in the IP address 192.168.0.0/24, 192.168.0 represents the subnet address.

An interface address, on the other hand, is used to uniquely identify a specific device or interface on a network. It is a unique IP address assigned to a network interface such as a network card or router interface. For example, an interface address could be 192.168.0.1.

What server type is normally used for data farm and archive server operations?

Answers

I think it’s the international server
A server farm is a group of computers acting as servers and housed together in a single location. A server farm is sometimes called a server cluster. So, a database server is the most appropriate answer.

I hope this helps!
Please Rate & Thank!
Please mark as Brainliest!

Have a wonderful day! : )

Imposing stricter recycling regulations would greatly benefit our city in many ways.

Which is the best revision of the underlined portion of the sentence?
would be a totally beneficial thing to do.
would be great and I’ll tell you why.
would be pretty great for our city for many reasons.
no change

Answers

The answer is (D) no change

Given that there is no underlined portion of the sentence, we cannot completely answer this question. However, basing on the excerpt borrowed from Erika’s letter to her mayor, I honestly would not change anything. Given that Erika is addressing the mayor about a serious issue, The sentence’s choice of words is correct and sounds very academic, professional and formal, something that Erika would want to achieve.



Answer:

(D) no change

Explanation:

Which of following allows you to share a file with someone that is too large to send via e-mail?
Dropbox
Google Drive
One Drive
All of the above

Answers

One can share files via email that is too large by drop box, g drive, and one drive. The correct option is D.

What is a drive?

A drive is a location (medium) that can store and read information that cannot be easily removed.

All drives contain files and programs that your computer uses. When you write a letter in a word processor, for example, the program is loaded from the drive.

When you need to send large files via email but they are too large, one of the more efficient solutions is to use cloud-based storage services.

Cloud storage services such as Mail Drop, OneDrive, and G Drive are excellent options for sending large files via email.

Thus, the correct option is D.

For more details regarding drive, visit:

https://brainly.com/question/966908

#SPJ5

A text-only forum accessed through a bulletin board service (BBS) is known as a _____.

Answers

Answer:

newsgroup---for apex

Final answer:

A text-only forum accessed through a bulletin board service is known as a discussion board, a precursor to modern internet communication systems.

Explanation:

A text-only forum accessed through a bulletin board service (BBS) is known as a discussion board. In the infancy of the internet, bulletin board systems were an early form of online communication.

These systems were pre-internet computer networks that connected personal computers using modems and phone lines. Users of BBS could share files, post messages, engage in discussions, and even play text-based games.

The significance of BBSs at the time is comparable to the modern-day impact of the European Union (EU) on trade or climate change on environmental policies - they transformed their respective fields.

Conformity is the acceptance of culturally approved goals and the means for achieving these goals.

Answers

Answer:

The following statement is "True".

Explanation:

Conformity acceptance word divided into two parts that are Conformity and acceptance. Conformity stands for change in behavioral change or conviction. Or considered the stress of the party. and the acceptance stands for thinking and trusting across community standards.  behaving and believing along social lines.

In other words we can say that achieving cultural goals via channels that are culturally approved and utilizing traditionally unorthodox methods to achieve cultural goals.

Camile uses specialized equipment designed by Olivia to analyze and predict weather and atmospheric changes. Which describes the career pathways of Camile and Olivia?

Answers

Camile   can go into Meteorology.
Olivia  should go into  engineering

answer

Olivia is in the Engineering and design pathway and Camille is in the science and meteorology pathway.

Explanation

engineering and design path way- this is a methodological series of steps that are used by engineers in creating functional products and processes.

science and methodology pathway- these are steps used by scientists to create explanations based on the evidence which they have gathered.

Which of the following statements is considered a safe rule of communication A Anyone you know only online is a stranger to you B After you get to know someone online, they can be considered a trusted friend C If you want to know if you can trust someone you met online, ask him to meet in person D Most people online are safe, so you don’t really need to worry about safe communication

Answers

A. Anyone you know only online is a stranger to you.

Answer:

A

Explanation:

took quick check conexus

Dan is a Civil Engineer for a company that builds nuclear power plants throughout the world. Which best describes the places he works and what he does there?

Answers

Answer:

the answer is c

Explanation:

Answer:

C. in a laboratory, where he designs power plants, and in a factory where the plants are manufactured

Explanation:

What is the exact number of bytes in a system that contains 6.4 bytes?

Answers

I believe this question should be; What is the exact number of bytes in a system that contains 6.4 Gbytes?

1 Gigabyte = 1,073,741,824 bytes 

How about 6.4 Gb = X?

X = (6.4 Gb×1,073,741,824 bytes) / 1 Gigabyte

X = 6,871,947,674 bytes

 

To apply the rule of thirds you first? PLZ HURRY AND ANSWER THIS

A/ divide the viewfinder into three equal horizontal divisions

B/ divide the viewpoint into three equal vertical divisions

C/ divide the viewfinder into three equal triangular divisions

D/ apply a tic-tac-toe grid to the viewfinder

Answers

B/ Divide the viewpoint into three equal vertical divisions
divide the viewpoint into three equal triangular divisions.

What is the default delay before scripts are executed?

Answers

Answer is 5 minutes

The default value for windows 8.1 joined to a server 2003 domain logon scripts delays is not configured. However, the windows 8.1 may have a delay processing logon scripts of 5 minutes. The script does not execute until 5 minutes are over. Users have a Group policy applied to them that is used to assign a logon script.


What do the concepts of data warehousing and data mining mean?

Answers

The term data warehouse denotes a group of databases that work together, which means enables integration of data between different databases. The data warehouse is a source of the data that is used for example in  the process of discovering interesting and useful patterns and relationships in large volumes of data. This process is called data mining.

Data warehousing involves collecting and managing large volumes of data, while data mining is used to discover patterns and insights from this data. Metadata, resolution, accuracy, and interoperability are key when evaluating data for analysis. Standardization is crucial for effective data retrieval and analysis.

Data warehousing is the process of collecting, storing, and managing large volumes of data from various sources in a central repository. Its purpose is to consolidate disparate data into a single, coherent database for efficient querying and analysis. On the other hand, data mining is the technique of discovering patterns, correlations, and insights from large datasets through statistical and computational methods. It forms part of a broader process of knowledge discovery in databases (KDD) and can include predictive analytics, which anticipates future trends and behaviors.

Key Concepts in Choosing Data for Analysis

Resolution: The level of detail within the data.Accuracy: The correctness and reliability of the data.Interoperability: The ability of the data to integrate and function with other datasets.

All these factors are part of metadata, which is essential for understanding the context and quality of the data. Metadata includes information such as the location, attributes, and time of data collection, aiding in the effective organization and interpretation of the data.

Aggregating and Analyzing Data

Data mining plays a crucial role in making sense of vast amounts of data collected from various surveillance and transactional sources. Through sophisticated algorithms, it turns the raw data into actionable insights, enabling organizations to leverage big data for decision-making purposes.

Standardization in Databases

To accommodate data inconsistencies and enhance retrieval and analysis, standardization through classification and coding is applied. This helps in unifying differing representations of similar data within the database, facilitating accurate analysis and querying.

When evaluating a dataset's adequacy, it's important to consider the relevance and quality of the data in relation to the research questions or conceptual framework. The process should be part of a well-planned research design to avoid irrelevant or useless data, highlighting the limitations of blind data mining.

The data in a database management system that identifies the names of​ tables, fields in each​ table, and the properties of each of the​ fields, as well as which fields are primary and foreign​ keys, etc. is called​ ____________.
a. data definitions
b. metadata
c. qualitative data
d. descriptive data
e. uberdata

Answers

The answer is (B) Metadata

By definition, Metadata describes other data or data about other data. In simple terms, it provides context for data. In DBMS, metadata defines attributes and data elements like data type, name, size, and etcetera. It also defines data that could be about records and structures like columns, length and fields.


B. Metadata is correct answer

The unique constraint differs from the primary key constraint in what way?â

Answers

The following question has multiple choices as follows

a. The UNIQUE constraint ensures that a specific condition is true before a data value is added to a table.

b. The UNIQUE constraint can be created at either the column level or the table level.

c. The UNIQUE constraint allows NULL values.

d. The UNIQUE constraint does not allow NULL values.

The answer is (C) The UNIQUE constraint allows NULL values.

The unique constraint differs from the primary key constraint in that it allows Null values. Primary key is not nullable while Unique constraints may be nullable. If for instance you try to make a nullable column as your primary key, SQL server will first convert it into a NOT NULL and then create the primary key.

How does a router handle a packet destined for a network that is not listed in the routing table?

Answers

The packet is dropped or discarded. By default, a router will send packets to a network that has been listed in the routing table. If it happens that the network is not listed, the packet will be discarded or dropped. Packets that do not have a default route or gateway of last resort are dropped.

 






Final answer:

A router handles packets destined for networks not listed in the routing table by using a default route or dropping the packet.

Explanation:

A router handles a packet destined for a network that is not listed in the routing table by using a default route or a gateway of last resort.

A default route is a general route that the router uses when it doesn't have a specific entry for the destination network. It allows the router to forward the packet to another router that may have more information about the destination network.

If there is no default route, the router will drop the packet and send an ICMP (Internet Control Message Protocol) message back to the sender, indicating that the network is unreachable.

Which of the following would most directly affect the operations of the digestive system

Answers


The answer:
The heart

Explantion:
Decreased blood flow can cause decreased motility in the gut causing nausea, lack of appetite, ineffective digestion and malabsorption of nutrients. Decreased blood flow can also cause stress on the gut and result in gastric ulcer formations.

Each​ _____ in a relational database table is a unique record of something that users want to track.

Answers

Database is a self-describing collection of integrated records.
Each​ key in a relational database table is a unique record of something that users want to track. The key is a column or group of columns that identifies a unique table row  and establish relationships between tables and within a table. 

Other Questions
Describe the relationships between the light reactions and the calvin cycle What is the value of p? 4 11 p = 11 4 5 PLZ Find all real values of $v$ that satisfy the equation $(v+6)^2 = 324$. If you find more than one, then list your values in increasing order, separated by commas. Why does Hamlet not kill Claudius when he has the perfect time and opportunity? Dramatic irony is the effect of the audience or reader knowing more than the characters do.True or False Find the smallest value of k if 264k is a perfect square Since all living organisms use the same four nucleotides in DNA structure, what is it that makes individuals unique?A)the incidence of the STOP codon in DNA B)the sequence of nucleotides in the DNA C)the location of the phosphate group on the DNA backbone D)the number of cytosine repeats in one strand REDOX WS1Identify the species being oxidized and reduced in each of the following reactionsa.Cr+1+ Sn+4Cr+3+Sn+2b.3Hg+2+2Fe3Hg+2Fe+3c.2As+3Cl2AsCl3d.NaBr+Cl2NaCl+Br2 e.Fe2O3+3CO2Fe+3CO2 Which of the following explains why snacking is a major contributor to obesity?Snacks have replaced regular meals.Snacks often contain multiple serving sizes.Snack sizes are smaller, so people eat more.Snacks are often full of empty calories and fat. Aliyah had $24 to spend on seven panicles after buying them she had $10. How much did each pencil cost What is the denominator of the fraction 1/9? What program does each branch of service have to assist in the prevention, response, and coping of sexual harassment and assault? Which three of the following expenses can student aid cover? Jenifer has 4/5 as many pictures on her camera as Luisa does Jennifer has 28 pictures on her camera . how may pictures do Jennifer and Luisa A 10-foot ladder is leaning against a tree. The bottom of the ladder is 4 feet away from the bottom of the tree. Approximately how high up the tree does the top of the ladder reach?A.2.4B.6.0C. 9.2D. 10.8 A restaurant has 26 tables in its dining room. It takes the waitstaff 10 minutes to clear and set 4 tables. At this rate, how long will it take the waitstaff to clear and set all the tables in the dining room? What does the speaker mean by the line "Nor hungry wolves at him shall catch" in the poem "As Weary Pilgrim, Now at Rest"? Given that MTW CAD, which angles are corresponding parts of the congruent triangles?M AM DM C What was the eventual fate of the ayyubid sultanate that salah al-din established in egypt? Select the correct factor from the presentation and calculate how many calories used. (Round to the hundredths.) A person weighing 165 lbs. jogs 1 mile in 8 minutes. How many calories used? A. 102.30B. 107.25 C. 253.85 D. 266.13