Answer:
Follows are the cdo0de to this question:
import java.util.*;//package
public class Table //defining class Table
{
public static void main(String[] asx)//main method
{
int x,y,i;//defining integer variables
Scanner bg=new Scanner(System.in);//creating Scanner class object
System.out.print("Enter first number: ");//print message
x=bg.nextInt();//input value
System.out.print("Enter Second number: ");//print message
y=bg.nextInt();//input value
for(i = 1; i <= y; i++)//defining for loop for print Table
{
System.out.printf("%d * %d = %d \n", x, i, x * i);//calculate and print table
}
}
}
Output:
Enter first number: 5
Enter Second number: 3
5 * 1 = 5
5 * 2 = 10
5 * 3 = 15
Explanation:
In the above code, three integer variable "x,y, and i" is declared, in which "x,y" variable is used to input value from the user end, and after input, the value the for loop is used, in which the second variable "y" count the rows, and "i, x" variable is used for calculates the multiplication of the table.
Select the best answer to the following question.
Remote data storage and the ability to access data from any device using the Internet is called
Answer:
I think its called "cloud computing"
Answer:
cloud computering
Explanation:
Document accurately describes the differences between servers and computers and between local and wide area networks. Document provides at least four suggestions including password managers and safe browsers.
Thinks someone could help me out with this?
Answer:
Cell towers and internet uses allow local and wide area networks, but they also allow you to steal IP and things like that.
Explanation:
This is quite difficult. I appologize if I get this wrong.
(Also if you upload a file for someone to answer, and they give you a link, don't click on it!! They track your IP address and things like that!)
Helppppp plzzzz it's computer science helpp plzzz
1. String
2. "is assigned to"
PlEASE HELP!
Identify in the space below three rules you feel are most important for deciding what personal information is
appropriate to post online.
Answer:
.
Names. Be careful how you use your name. Avoid using your full name. Even a nickname could spell trouble -- for instance, if it says something suggestive about your character, if it's a name you already use with others who know your real identity, or if it's made up from your real name (say, from your initials). First names are best, unless yours is extremely unusual. These days, many people do use their full names for online posting -- on social media sites and blogs for example. Just know that in doing so you're raising the risk of becoming an identity theft victim.
Photos. Bearing in mind Golden Rule #1, don't post photos you wouldn't want everyone to see. Full face, high resolution photos may be "snagged" (copied) and used for identity theft. Some people don't know how easy this is to do with any photo, with just a couple of clicks. Also, as a matter of etiquette, don't post photos of others without their permission, unless you're prepared for the consequences if the other person doesn't think it's funny. For preference, use photos in which identities are obscured. And, as a general rule, don't post photos of children online (especially not other people's children without permission). If you want to share photos of your kids, put them in a private online album, accessible by invitation or password. Or email them directly to your friends.
Explanation:
Meat and poultry exposed to some forms of radiations to extend shelf life. *
Answer:
Food Irradation
Explanation:
:)
round 74,361 to the nearest 10
Answer:
74,400 i think
Explanation:
Select all the correct answers.
Which TWO of the following are recommended practices to protect users' privacy while using email services?
Avoid forwarding a personal emails to others.
Avoid forwarding jokes and trivia using email.
Avoid using webmail if you have an email client on your computer.
Avoid opening emails from unrecognized senders.
Avoid using webmail in the workplace:
Answer: Avoid forwarding a personal email to others and most likely Avoid forwarding jokes and trivia using email.
The recommended practices to protect users' privacy while using email services are options A and C: avoid forwarding a personal emails to others and avoid using webmail if you have an email client on your computer.
What do you mean by term E-mail?
An E-mail is refers to as the communication source. It is a specialized computer network that stores, processes, and send the material from one person to another within seconds..
E-mail is considered as the computer equivalent but it has many advantages like timeliness and flexibility.
Moreover, the content of email include text, files, images or other kind of attachments send by the specified person to the one or more than one groups.
In order to protect the personal data of the user, it is recommend that people should note share their personal information with other and specially the young generation do not use webmail if the another party already utilize your computer.
Nowadays more frauds are happen due to the fact that people are more indulge in these communications for their better advancements. So, we have to take every step very carefully.
Therefore, correct options are A and C.
Learn more about E-mail, refer to the link:
https://brainly.com/question/13313275
#SPJ2
Hello Everyone,
Please I have been have problems answering this question. I do not know if anyone could be of help to me.
Describe the difference between objects and values using the terms “equivalent” and “identical”. Illustrate the difference using your own examples with Python lists and the “is” operator.
Describe the relationship between objects, references, and aliasing. Again, create your own examples with Python lists.
Finally, create your own example of a function that modifies a list passed in as an argument. Describe what your function does in terms of arguments, parameters, objects, and references.
Create your own unique examples for this assignment. Do not copy them from the textbook or any other source
what are the different types of document required for mail merge?
Answer:
More Information. A mail merge is used to create form letters, mailing labels, envelopes, directories, and mass e-mail message and fax distributions. There are three documents that are involved in the mail merge process: the main document, the data source, and the merged document.
Explanation:
is a way og saving a file so it can be used by a different program
Answer:
what are you even asking
a___ is a placeholder where you can enter text to manipulate and give new graphical effects.
Answer:
A "text box" is a placeholder where you can enter text to manipulate and give new graphical effects
HOW TO USE THIS IN A STORY CAN ANYONE HELP PICK % WORD FROM THE PAGE AN MAKE A STORY WHY DO I LIKE SUMMER ?????////
get 60 piont if you if you help meeeeeeeeeeee
ASAPPPPPPPPPPPPPPPPPPPPPP
The sunshine
Light mornings
Long light nights
BBQs in the garden
The smell of sun cream
Pretty wildflowers
Cloudless blue skies
Going to the beach
Feeling the warm sun on your face
Summer clothes
Sunglasses
Picnics in the park
Long walks
Sitting out on a warm evening
Eating fresh tasty salads
Drinking sangria
Orange glowy sunsets
Fresh air
Exploring new places
Ice cream (or Dairy Free alternative)
Summer playlists
Road trips
Eating fresh strawberries
Ice cold drinks on a hot day
The smell of freshly cut grass
Not having to wear a jacket when out
Autumn is just around the corner
Holidays at home or abroad
Salty sea breezes
Summer always seems to make people happier
Answer:
Picnic in the Park
Explanation:
Parks are my favorite spots to chill or go for a stroll. Parks make walking in a neighborhood more fun and offer space for common sports, promoting physical activity. They have hiking trails and other amenities to get people moving. Every place, in my opinion, needs some green space where people can get away from the crowds. I live near a park, so if the weather is good, I usually go there once or twice a week. Therefor, my favorite summer activity is going to the park.
Plzzzzz helppppp hurry plzzzzzzzz
What is the most important function of a network operating system (NOS)?
Answer:
One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.
Explanation:
One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.
What is network operating system?An operating system for computers known as a "network operating system" (NOS) is primarily made to handle workstations, personal computers, and occasionally older terminals that are linked together over a local area network (LAN).
A NOS's supporting software enables resource sharing and communication amongst various networked devices. A NOS's usual hardware configuration consists of several personal computers, a printer, a server, and file servers that are linked by a local network.
Because earlier iterations of the fundamental operating system weren't created with network use in mind, network operating systems
Therefore, One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.
To learn more about network operating system, refer to the link:
https://brainly.com/question/28356173
#SPJ2
A
is the smallest of the network types and provides connectivity for one person’s devices.
Answer:
Personal Area Network (PAN)
Explanation:
A Personal Area Network (PAN) is the smallest of the network types and provides connectivity for one person’s devices.
A personal area network refers to a computer network that is used for interconnecting various electronic devices that are centered on the workspace of an individual. A PAN enables data transmission among the following devices: 1. Computers
2. Smartphones
3. Tablets
4. Personal digital assistants.
libre office is what program
After inserting a video into your slide how can you test it
Explanation:
How to insert video into PowerPoint
Click on the slide you want, then go to Menu > Insert.In the top right corner, click Video > Video on My PC.Find the video you want to add and click “Insert”.Adjust the settings in the Video Format toolbar to make sure it plays the way you want.Certain programs, such as Adobe Acrobat
Reader, may install additional tabs to the
Ribbon. These tabs are called add-ins.
True or False
Answer:
true
Explanation:
mark brainliest ☺☺☺☺☺☺
Decrypt this message: P ht uva h zwf
It has been encrypted with a shift of 7 (remember each letter needs to go backwards.
uhhh pls help with this ill mark brainliest
A computer game picks a random number between 1 and 100, and asks the player to guess what the number is. If the player makes a correct guess, the game congratulates them, and stops. If the player does not make a correct guess, the game tells the player that their guess is either too high, or too low. If the player guesses with an answer that is not a number between 1 and 100, an error message is displayed. The game continues to give the player chances to guess, until the player guesses correctly. You are going to plan an interactive program to implement this game. do this using scratch
Answer:
In Python:
import random
computerguess = random.randint(1,101)
userguess = int(input("Take a guess: "))
while not (userguess == computerguess):
if userguess<1 or userguess>100:
print("Error")
elif not (userguess == computerguess):
if userguess < computerguess:
print("Too small")
else:
print("Too large")
userguess = int(input("Take a guess: "))
print("Congratulations")
Explanation:
This imports the random module
import random
Here, a random number is generated
computerguess = random.randint(1,101)
This prompts the user for a guess
userguess = int(input("Take a guess: "))
The following loop is repeated until the user guess correctly
while not (userguess == computerguess):
If user guess is not between 1 and 100 (inclusive)
if userguess<1 or userguess>100:
This prints error
print("Error")
If the user guessed is not correct
elif not (userguess == computerguess):
If the user guess is less
if userguess < computerguess:
It prints too small
print("Too small")
If otherwise
else:
It prints too large
print("Too large")
This prompts the user for a guess
userguess = int(input("Take a guess: "))
The loop ends here
This prints congratulations when the user guess correctly
print("Congratulations")
list any four e-commerce website
Answer:
Amazon. Founded in the US in 1994, Amazon started as an online bookstore that later diversified to products including media, electronics, apparel, furniture, food, toys, and jewelry.
eBay. ...
Walmart. ...
Etsy. ...
Home Depot. ...
Target. ...
Best Buy. ...
Wayfair.
Answer:
I'm sorry is this a question?
how can i help?
Explanation:
Sorry this ain't bout HW but how do I get this off my screen it's pretty annoying
Complete the sentence.
One way to increase the reliability of a hard disk drive is by making it part of ____
an optical array
a capacitator
a RAID
an analog ray
Answer: It is raid
Explanation:
Took the test for edge
How do I calculate this square footage?
Answer:
To calculate it, you have to break it apart. Sorry for the bad writing but after you break it apart, you multiply the smaller squares. Then with all of the smaller areas, add them together for the final answer which in this case is 456.
Can someone urgently help me with my java code (I WILL GIVE BRAINLIEST)?! Ive been working on it for hours and its not working! (please give an actual answer...)
*examples of required output at the bottom*
code: public class CircularList
{
private ListNode head;
private ListNode tail;
private int size;
public CircularList()
{
head = tail = null;
size = 0;
}
public int size()
{
return size;
}
public boolean isEmpty()
{
return (size == 0);
}
public int first()
{
if (head != null) {
return head.getValue();
}
return -1;
}
public Integer last()
{
if (tail != null) {
return tail.getValue();
}
return -1;
}
public void addFirst(Integer value)
{
head = new ListNode(value, head);
if (tail == null) {
tail = head;
}
size++;
}
public void addLast(Integer value)
{
ListNode newTail = new ListNode(value, null);
if (tail != null) {
tail.setNext(newTail);
tail = newTail;
} else {
head = tail = newTail;
}
size++;
}
public void addAtPos(int pos, Integer value)
{
if (pos == 0) {
addFirst(value);
return;
}
if (pos <= 0 || pos > size) {
return;
}
if (pos == size) {
addLast(value);
return;
}
ListNode ptr = head;
for(int i=0; i = size) {
return retVal;
}
if (pos == 0) {
return removeFirst();
}
ListNode ptr = head;
for(int i=0; i
ptr = ptr.getNext();
}
retVal = ptr.getNext().getValue();
if (pos == size-1) {
tail = ptr;
tail.setNext(null);
} else {
ptr.setNext(ptr.getNext().getNext());
}
size--;
return retVal;
}
public int findNode(Integer find)
{
ListNode ptr = head;
for(int pos=0; pos
if (ptr.getValue() == find) {
return pos;
}
ptr = ptr.getNext();
}
return -1;
}
public void rotate()
{
addLast(removeFirst());
}
public String toString()
{
String output = "";
ListNode iter = head;
while(iter != null) {
output += String.format("%d ", iter.getValue());
iter = iter.getNext();
}
return output;
}
}
size = 6 first = 50 last = 60
50 20 10 40 30 60
removeFirst = 50
size = 5 first = 20 last = 60
20 10 40 30 60
removed = 30
size = 4 first = 20 last = 60
20 10 40 60
size = 4 first = 20 last = 60
20 10 40 60
found at -1
removed = -1
size = 4 first = 20 last = 60
20 10 40 60
size = 4 first = 10 last = 20
10 40 60 20
Answer:
code 345code 4537
Explanation:
Charles was supposed to present his PowerPoint slides to his classmates in a classroom, but now he has to present in the auditorium in front of his entire grade. What change will Charles have to make when he presents his slides?
He will have to change his topic.
He will have to rearrange his slides.
He will have to speak more loudly and clearly.
He will have to tell his friends about the change.
HELP ASAP
Answer:
it is c
Explanation:
cus of the long and huge hall of u have in ur school
Answer: C
Explanation: Because he will need the whole grade to hear, or you know grab a mic :D HOPE YOU ENJOY YOUR DAY
Examples and meaning of external hardware.
Answer:
External hardware devices include monitors, keyboards, mice, printers, and scanners. external hardware devices are usually called peripherals.
5 examples of hardware?
Mouse, Keyboard, Monitor, Printer, USB, CD Drive, RAM, Hard Drive, Joystick, Scanner, DVD, CPU, Motherboard, Etc.
Explanation:
Hope this help have a good rest of your day
Which software documentation guideline did the IEEE establish?
A.
Avoid spelling errors.
B.
A glossary should be present to define technical terms and acronyms.
C.
The font has to be in black.
D.
Documents should not have page numbers.
Answer:
B
Explanation:
I am big brain
ANSWER ASAP!!!!!!!!
Which statement regarding dialogues in multiplayer games is true?
A.
Dialogues are based only on players’ actions.
B.
Dialogues are restricted to the game’s characters.
C.
Dialogues may be between the game’s characters as well as the players.
D.
Dialogues serve the sole purpose of advancing the storyline.
E.
Dialogues are based only on events that have occurred in the game.
Answer:
The answer to this question will mostly be E
Discussion Topic
How does social media affect the process of globalization? Give examples. In what
ways does social media help in creating global communities? Discuss other positive
influences of social media. What might be the adverse effects of excessive use of social
media?
Answer:
Social media positively affects and impacts the process of globalization. ... Global communities is a social infrastructure tool and as social media helps in strengthening social relationships and bringing people and communities together it leads to creating a string global community.