Loops are frequently used to ____ data; that is, to make sure values fall within an acceptable or reasonable range.

A. validate
B. enter
C. add
D. manipulate


Answer: A

Computer Science & Information Technology

You might also like to view...

A(n) ________ query can be used for adding records to an existing table

A) append B) update C) make table D) delete

Computer Science & Information Technology

One reason allowing a user to change the desktop configuration poses a security problem is that to change a desktop the user must also be given rights to change other system settings

Indicate whether the statement is true or false.

Computer Science & Information Technology

DNSSEC adds additional and message header information, which can be used to verify that the requested data has not been altered in transmission.

a. resource records b. field flags c. hash sequences d. zone transfers

Computer Science & Information Technology

Pass by value is also referred to as pass by reference.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology