Indefinite repetition is controlled by a:
a. Counter.
b. Sentinel value.
c. Absence of a condition.
d. Non-constant condition.
b. Sentinel value.
Computer Science & Information Technology
You might also like to view...
An administrator is troubleshooting analog telephony issues on the punch down block. Which of the following tools would be MOST useful in this scenario?
A. T1 loopback B. Butt set C. Multimeter D. Protocol analyzer
Computer Science & Information Technology
The DSS makes use of the Secure Hash Algorithm and presents a new digital signature technique known as the ______________ .
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology