Sentinel-controlled iteration is also known as:

a. Definite iteration.
b. Indefinite iteration.
c. Multiple iteration.
d. Double iteration.


b. Indefinite iteration.

Computer Science & Information Technology

You might also like to view...

Which of the following is not a base/derived class relationship?

a) Ford/Taurus b) University/Boston University c) Sailboat/Tugboat d) Country/USA

Computer Science & Information Technology

Input fields that have small, helpful features added for validation and inputting content.

a. Hidden fields b. Select boxes c. Radio buttons d. Password box e. Checkboxes f. Email, telephone, and URL input types

Computer Science & Information Technology

Every keystroke is converted into a(n) ________ number, which can then be understood by the computer

Fill in the blank(s) with correct word

Computer Science & Information Technology

The essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet.

A. FTP B. TCP/IP C. HTTPs D. DNS

Computer Science & Information Technology