A flag-controlled loop is also called a ____.

A. sentinel-controlled loop
B. counter-controlled loop
C. state-controlled loop
D. posttest form loop


Answer: C

Computer Science & Information Technology

You might also like to view...

Ripping is a slang term that refers to the process of importing tracks from an audio CD to your computer's hard disk.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

All of the following were top cybercrimes reported to the IC3 EXCEPT ________

A) non-auction scam B) advance fee fraud C) theft of services D) identity theft

Computer Science & Information Technology

The optimum approach for escalation is based on a thorough integration of the monitoring process into the __________.

A. IDE B. CERT C. ERP D. IRP

Computer Science & Information Technology

A server technician wishes to buy the best possible server for RAID 5. Which of the following types of servers is BEST suited for RAID 5?

A. Tower servers B. Redundant servers C. Blade servers D. Stand-alone servers

Computer Science & Information Technology