Bruno is asked to create a program that will require the user to enter a passcode. If the wrong passcode is entered, the user can try again until they get it right. What kind of loop should be created for this? A. a binary loop B. a condition-controlled loop C. a count-controlled loop D. an interface loop

Answers

Answer 1

Answer:

a condition controlled loop

Explanation:

if a user get the password right he will not have to restart

Answer 2

In the given scenario, the kind of loop that should be created is a condition-controlled loop. (Option B).

What is a Condition-controlled Loop?

A condition-controlled loop is also known as a "while loop." It continues to execute its code block as long as a specified condition is true. In this case, the condition would be something like "while the entered passcode is not correct." The loop will keep running until the user enters the correct passcode, at which point the condition becomes false, and the loop exits.

Accordingly, in this scenario, Bruno needs to create a loop that repeatedly asks the user to enter a passcode and checks whether the entered passcode is correct or not. If the entered passcode is incorrect, the loop should allow the user to try again until they enter the correct passcode.

Learn more about condition-controlled loop here: https://brainly.com/question/34137222

#SPJ2


Related Questions

Suppose that you set the application-level environment setting for the current workspace to store all your data in the same geodatabase. However, you want the outputs for one of the models to be stored in another geodatabase. What is the most efficient way to do it

Answers

Q:

Suppose that you set the application-level environment setting for current workspace in the geoprocessing options to store all your data in the same geodatabase, but you want the outp…

A:

Set a model-level environment setting for the workspace because it will override the application level.

the simple mixture of flour and water​

Answers

Answer:

Batter is a simple mixture of flour and water is used to make crepes and pancakes. It is also used to coat fruit for fritters.

What do you call a software program that runs on a web server? Please respond ASAP! Please no comments unless you have a legit answer!

Answers

A software program that runs on a web server is a web browser

Using the code to the right, which best describes the piece of code labeled my_graphic?

Answers

Answer:

a property

Explanation:

A JavaScript property is a characteristic of an object, often describing attributes associated with a data structure. There are two kinds of properties: Instance properties hold data that are specific to a given object instance. Static properties hold data that are shared among all object instances

Soft skills high module 7

Answers

Yes this is the fight answer I hope it helps

What are three coding languages that are used to build websites?

Answers

Answer:

Python, Javascript, and Java

Explanation:

These are the main coding languages used for building most websites.

Abby has received a request for a data set of actual data for testing a new app that is being developed. She does not want the sensitive elements of the data to be exposed. What technology should she use

Answers

Q:

Abby has received a request for a data set of actual data for testing a new app that is being developed. She does not want the sensitive elements of the data to be exposed. What technology should she use?

A:

Masking

Because the clients and the server perform different functions and can run two different operating systems, there is an arrangement of client/server architecture known as ____.

Answers

Answer:

✓ two-tier architecture

Explanation:

Because the clients and the server perform different functions and can run two different operating systems, there is an arrangement of client/server architecture known as ____.

✓ two-tier architecture

A small publishing company has a network design such that when a broadcast is sent on the lan, 200 devices receive the transmitted broadcast. how can the network administrator reduce the number of devices that receive broadcast traffic?

Answers

The network administrator reduce the number of devices that receive broadcast traffic  and Segment the LAN into smaller LANs and route between them.

What is this segmentation about?

By segmenting the one big network into a smaller network, the network administrator is one that has developed two smaller broadcast domains.

Therefore, in the scenario above, The network administrator reduce the number of devices that receive broadcast traffic  and Segment the LAN into smaller LANs and route between them.

Learn more about  network administrator from

https://brainly.com/question/20424057

#SPJ1

What are the qualities of strong leaders? Check all that apply. They inspire others. 1)They are easily influenced by others. 2)They are outstanding role models. 3)They have a strong sense of purpose. 4)They lack self-confidence.

Answers

Answer: 2 and 3
Explanation:

I would pick 2 and 3 based on process of elimination

What data type is this statement defined as in Python?
testAvg = 0.00;

A. integer
B. string
C. float
D. real

Answers

String because in python a succession of Unicode characters is called a string. Unicode was created to encompass all characters in all languages and bring encoding standardization.

What is python?

Python is a programming language for creating websites and software, as well as automating processes and conducting data analysis.

Python is a general-purpose programming language, which means it can be used to develop a wide range of applications and isn't tailored to any particular problem.

Thus, option B is correct.

For more details about python, click here

https://brainly.com/question/13441316

#SPJ1

Select the correct term to complete the sentence.

A is an application with browser functionality embedded within an application written for a specific platform.


A is an application run through a browser enabling cross-platform access.


A is an application written for a specific device and operating system.

Answers

Answer:

A program that searches a database for specific words and returns a list of webpages or documents in which the search term was found. ... A _____ is an application that runs in a

Explanation:

First blank: Hybrid App

Second Blank: Web App

Third blank: Native App

PROOF:

The three main objectives of information security are.

Answers

Answer:

confidentiality, integrity, availability

Explanation:

Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others

Integrity: Keeping the data intact, complete and accurate, and IT systems operational

Availability: An objective indicating that information or system is at disposal of authorized users when needed.

A file can be safed with a different file name then it currently has by clicking on save ? in the file tab

Answers

Answer:

Click the File tab. Click Save As. Choose a file location, such as OneDrive or This PC to store your file.

Explanation:

click the File tab. Click Save As. Choose a file location, such as OneDrive or This PC to store your file. In the File name box, enter a new name for the file. In the Save as type list, click the file

If a program needs to respond to what the user inputs by printing one of three different statements, what will the program require? Group of answer choices database random number generator decision generator conditional statement

Answers

Answer:

B

Explanation:

Answer:

Answer B: random number generator

Explanation:

Computer programming is the process that professionals use to write code that instructs how a computer, application or software program performs. At its most basic, computer programming is a set of instructions to facilitate specific actions. If you're wondering what a computer programmer is, it's a professional that creates instructions for a computer to execute by writing and testing code that enables applications and software programs to operate successfully.

By default, how many levels does the outline view contain?.

Answers

Answer:

Nine

Explanation:

By default, how many levels does the Outlining View contain? Nine.

What is the first step you should take if unable to make bill payments on time?

Answers

Answer:

"talk to your landlord, creditors or bank about your financial situation to see if they can offer any leniency or a payment plan". just ask for extra time

Explanation:

you are presenting with two monitors. which view displays a preview of the next slide and speaker notes on the second monitor?

Answers

the preview would be constructed by putting the next slide monitor on the left and the speaker notes on the name of the dominant hand… the right.

You need to design a network that supports 275 hosts. You want to place all hosts in a single broadcast domain, and you want to make sure you do not waste IP addresses. How should you implement your plan

Answers

Answer:

Place all hosts on the same subnet. Use a mask of 255.255.240.0.

Explanation:

You need to design a network that supports 275 hosts. You want to place all hosts in a single broadcast domain, and you want to make sure you do not waste IP addresses. How should you implement your plan?

✓ Place all hosts on the same subnet. Use a mask of 255.255.240.0.

What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.

Answers

Answer:

What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.

What is the device that converts a sign from binary or analog form into a signal of another form

Answers

Answer:

A digital-to-analog converter is a device that converts a discrete signal in the form of a binary digital quantity into an analog quantity based on a standard quantity (or reference quantity), referred to as a DAC or D/A converter. Electronic Basics #10: Digital to Analog Converter (DAC) Catalog Ⅰ Composition and characteristics

Explanation:

Which of the following statements best describes the future of mass media?
O We will always need mass media, but because of social media, we will rely on it less.
O Although we still need it now, we will one day no longer need mass media because of social media.
o We no longer need mass media at this point in our culture because of our use of social media.
O It is likely that we will always need mass media, because social media cannot last.

Answers

The option that best describes the future of mass media is We will always need mass media, but because of social media, we will rely on it less.

What is the growth of mass media like?

The use of the mass media in recent times is one that is known to be   growing rapidly in terms of  the kinds of electronic media forms used, the number of TV stations and others. ,

Conclusively, The option that best describes the future of mass media is We will always need mass media, but because of social media, we will rely on it less because the use of social media may outweigh the use of mass media.

Learn more about mass media from

https://brainly.com/question/26152499

#SPJ1

Answer:

A.) We will always need mass media, but because of social media, we will rely on it less

Mass media refers to forms of communication that reach large audiences, such as television, radio, newspapers, and magazines. While social media has certainly had an impact on the way people consume information and connect with others, it is unlikely that mass media will become obsolete. However, it is likely that people will rely on mass media less as they increasingly turn to social media and other online sources for information and entertainment.

That being said, mass media still holds an important role in our society, providing us with news, entertainment, and other forms of information. As such, it is likely that mass media will continue to evolve and adapt to changing technologies and social trends in the future.

Reports and logs generated by forensic tools are typically in text format, word processing, spreadsheet, or ____ format.Reports and logs generated by forensic tools are typically in text format, word processing, spreadsheet, o

Answers

Answer:

Reports and logs generated by forensic tools are typically in text format, word processing, spreadsheet, or ____ format.

✓ HTML

Explanation:

Convert the binary expansion of each of these integers to a decimal expansion. A) (1 1111)2 b) (10 0000 0001)2 c) (1 0101 0101)2 d) (110 1001 0001 0000)2

Answers

Step 3: Double the total and add the next leftmost digit. Repeat this until you run out of digits. Step 4: The result you get after adding the last digit to the previous doubled total is the decimal

What term refers to a hacker that uses
technology to announce or deliver a social,
ideological, religious. or political message?

Answers

Answer:

Hacktivist

Explanation:

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof- service attacks.

7.6.8: What's in a Name? code hs help

Answers

The exercise here is to write a code that prints the result "What's in a Name?". See the soluton for this below.

What is the code for the above exercise?

The CodeHS that states: "What 's in a name?" is:

print('Hello,', input('What's in a name? '))

CodeHS refers to an online platform for learning that is interactive. It offes turorials on general computer science knowledge as wella s programming.

Learn more about CodeHS at

https://brainly.com/question/15599262

#SPJ1

pivotetable are based on?

Answers

A pivot table is known to be based on the summary of your data and it is one that  report on different topics or trends.

What is pivot table?

This is known to be a kind of table that shows the summary of one's data, as they are said to be packaged in a chart.

Note that, A pivot table is known to be based on the summary of your data and it is one that  report on different topics or trends.

Learn more about pivot table from

https://brainly.com/question/15214258

#SPJ1

Which type of document would be best created in Word?
Animation
Newsletter
Presentation
Spreadsheel​

Answers

Answer:

it would be Animation I declare

Computer Vision and Industrial Robots
Consider an industrial robot performing several tasks in an assembly line. Such machines perform a single task with great speed and efficiency. Conduct research on the Internet and list what you feel would be its main components if computer vision was implemented. Ask yourself what are the advantages of adding a computer vision system to this robot. Which robot do you expect better performance from, a robot with computer vision or robot without computer vision.

Answers

Answer:

View Computer Vision Unit Activity.docx from COMPUTER SCIENCE 101 at Edoptions High School. Consider an industrial robot performing several tasks in an assembly line.Machine Vision in industrial applications. Robots working in industrial applications need visual feedback. This is used to navigate, identify parts, collaborate with humans and fuse visua

Explanation:

Many industries are feeling the effects of skilled labor shortages. At the same time, companies are reluctant to invest heavily in training and developing unskilled employees, for fear of losing them afterward through defection to competitors. With no end in sight to the workforce shortfall, the appeal of robots as an efficient supplement, and even replacement, for human labor is continuing to grow.

The cost of robotics is generally falling, and alternative business models like robotics-as-a-service (RaaS) make industrial robots accessible even to companies that don’t have substantial capital budgets to exploit. The affordability of the units themselves, along with the fact that programming is becoming more straightforward and hence less costly, is also boosting the appeal of industrial robotics adoption.

Answer:if u still need help i can help you

Explanation:

How is a secure HTTP (HTTPS) different from a non-secured HTTP?
Secure HTTP is armed with a proxy service that inspects any incoming data.
O Secure HTTP is armed with a series of firewalls to protect it from potentially unsafe files.
O Secure HTTP is armed with passwords to ensure that only authorized users gain entry.
Secure HTTP is armed with secure socket layers to create another layer of security

Answers

Answer:

the second last option

Explanation:

secure HTTP is armed with passwords to ensure that only authorised users gain entry.

the data is encrypted during transmission

Other Questions
the half life for strontium-90 is 29 years. how many half-lives did the sample go through at the end of 87 year Which of the following is a safety consideration when hunting wild turkey? Use a rooster call, avoid using a hen call B Use a hen call, avoid using a rooster call C Mark your hunting area with camouflage netting D If hunting with another person, place decoys between you and the other hunter Find the best statement that describes Bilirubinuria:O Glucose in urineBilirubin in urineO Protein in urineO a pigment metabolite from the destruction of hemoglobinO Red blood cells in urineO White blood cells or pus in urine Find the surface area of the regular pyramid shown in the accompanying diagram. If necessary, express your answer in simplest radical form.-15A. 360 + 643 unitsB. 720 + 16v3 units'OC. 720 +61, 3 unitsD. 360 + 16,3 units good evening! Can someone please answer this, ill give you brainliest and your earning 50 points. Would be very appreciated. what is a solution of 7-2x+5=8 What is the value represented by the letter E on the box plot of the data?45, 45, 50, 55, 60, 65, 72, 75, 80, 80, 90B.DEEnter your answer in the box. Mackenzie chooses one candle and then chooses another candle. What is the probability that Mackenzie selects a polka dot candle both times? Find each value or measure. Assume that segments that appear to be tangent are tangent. A 16kg dog is running 4m/s. Find its kinetic energy.4J64 J128 J256 J A laser with a power output of 2. 15 mw at a wavelength of 413 nm is projected onto calcium metal Combinez les deux phrases en utilisant un pronom relatif (qui, que ou dont)1. Voici le tableau. Picasso a peint ce tableau. Will give brainiest!Which of the following is not a reason the American Community Survey was created?1. to estimate annual household income.2. to assess the demographics of the American people3. to misspend government funding4. to evaluate the average ages of communities can anyone help me find the area of these two ty How did the work progress administration affect employment for young people? they gave younger workers more rights by encouraging union membership. they increased the job opportunities for younger workers. they caused a decrease in jobs available for younger workers. they made younger workers pay higher taxes because of their age. Try to do all Ill make brain list + 25 points What is the slope of the line that passes through the points ( 1 , 1 ) (1,1) and ( 8 , 7 ) (8,7)? Write your answer in simplest form. Which wcu library database provides pro/con arguments on a variety of controversial social issues?. point has been translated left and down. Based on the graph, which could be true? Check all that apply. Given the following triangle:(2x+4)A(2x-9)Find the measure of angle A:Find the measure of angle B: