Indefinite repetition is controlled by a:

a. Counter.
b. Sentinel value.
c. Absence of a condition.
d. Non-constant condition.

b. Sentinel value.

Computer Science & Information Technology

You might also like to view...

An administrator is troubleshooting analog telephony issues on the punch down block. Which of the following tools would be MOST useful in this scenario?

A. T1 loopback B. Butt set C. Multimeter D. Protocol analyzer

Computer Science & Information Technology

The DSS makes use of the Secure Hash Algorithm and presents a new digital signature technique known as the ______________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology