In a(n) ____ loop, the evaluation occurs after the instructions within the loop are processed.

A. pretest
B. inline test
C. execute
D. posttest


Answer: D

Computer Science & Information Technology

You might also like to view...

The data security manage function is geared around ____ creation and enforcement.

A. procedure B. policy C. standard D. resource

Computer Science & Information Technology

?Articles may be nested within other HTML elements.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The class declaration uses the keyword class and includes:

A. the function call statements. B. member data and member function prototypes. C. initialization statements for data members. D. return statements for all functions.

Computer Science & Information Technology

Why might you want to write a program in a machine-independent language instead of a machine-dependent language? Why might a machine-dependent language be more appropriate for writing certain types of programs?

What will be an ideal response?

Computer Science & Information Technology