HELP IMPORTANT!!

i need help with Java basics

HELP IMPORTANT!! I Need Help With Java Basics

Answers

Answer 1

Answer:

C

Explanation:

Strings should be concatenated with +.


Related Questions

can you fart and burp at the same time?

Answers

Answer:

Yes you can

Explanation:

Although farting and burping at the same time is a very rare phenomenon, it’s very possible. When this happens at the same time it is usually called a Furp.

This occurrence usually happens when there’s a lot of intake of foods which have a large percentage of gas . These gases often need to be expelled through processes such as burping and farting.

Read each question below. Then, using the drop-down menus, decide if it represents the purpose, construction, or support aspect of choosing a website host.
Will the website be built by a programmer at a company?
What type of content will be on the website?
Will the website be used to share family pictures or as a professional site for posting news?
Will customers be making secure transactions on the website?
How extensive of a control panel, or location of login and website control, will be needed?

Answers

Answer:

ConstructionPurposePurposeSupportConstruction

Explanation:

Will the website be built by a programmer at a company? construction

What type of content will be on the website?  purpose

Will the website be used to share family pictures or as a professional site for posting news?  purpose

Will customers be making secure transactions on the website? support

How extensive of a control panel, or location of login and website control, will be needed?  Construction

__________________________________________________

When I’m design view, Henrietta deleted a previous criterion, added a new column, and filtered patients’ age. Which best describes what Henrietta did?

Answers

Answer:

Explanation:

b

what is font tag? write the name of attribute which is used in font tag​

Answers

Answer:

The font tag is used to change the color, size, and style of a text.The font tag is having three attributes called size, color, and face to customize your fonts. To change any of the font attributes at any time within your webpage, simply use the <font> tag.

how does digital and hybrid computers differ in storage​

Answers

Digital computers perform functions like mathematical, complex calculations, media streaming, etc. While hybrid computers work with the duo combination of analog (analog Quantities like the voltage, temperature) and digital (mathematical functions, complex calculations, media streaming) computers at the same time.

Which line of code will allow the user to enter their current temperature to the nearest tenth of a degree?Group of answer choicesnum1 = input(""What is your temperature?"")num1 = int(input(""What is your temperature?"")num1 =float(input(""What is your temperature?""))1num = print(""What is your temperature?)

Answers

In programming we have different data types and in this question two data types was specified, Int and float, the only data type that can receive input to the nearest tenth of degree is float, hence, float(input(""What is your temperature?""))

Data types are use as place holders, we have the primitive and non-primitive data types

Example of data types are FloatArrayIntegerDoubleString

Learn more about data types at

https://brainly.com/question/179886

When media is used to communicate with a very large audience, it is referred to as media.

Answers

Answer:

mass media

Explanation:

Answer:Mass media communication

Explanation:

A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
the DMZ: SQL injection on an infrequently used web server that provides files to vendors SSL/TLS not used for a website that contains promotional information
The scan also shows the following vulnerabilities on internal resources: Microsoft Office Remote Code Execution on test server for a human resources system
TLS downgrade vulnerability on a server in a development network In order of risk, which of the following should be patched FIRST?
A. Microsoft Office Remote Code Execution
B. SQL injection
C. SSL/TLS not used
D. TLS downgrade

Answers

Answer:

A. Microsoft Office Remote Code Execution

Explanation:

From the given options, we have;

The web server having a SQL injection is infrequently use

The information on the website having SSL/TLS not used is promotional

The location of the server having  a TLS downgrade is on a development network

The location of the Microsoft Office Remote Code Execution is on a human resource system test server

Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE,  cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.

After a chart has been inserted and formatted, is it possible to change the data range it refers to or to add new rows of data?

No, additional data cannot be included in a chart once it has been created; the user should delete the chart and create a new chart.
Yes, click the Select Data button in the Data group under the Design tab to extend or reduce the data range.
Yes, click the chart, select the additional rows or columns of data to add, and press Enter on the keyboard.
Yes, double-click the chart and select Properties from the list; in the Properties box, insert the new data range to include in the chart.

Answers

Answer: Yes, click the Select Data button in the Data group under the Design tab to extend or reduce the data range.

Explanation:

Excel allows one to be able to update the data in a graph because the designers knew that information needs to be updated sometimes.

This is why there is an option to use the Data button in the Data group which is under the Design tab to increase or decrease the data range that is to be used in the chart which means that a new row of data could even be added.

Design a sequential circuit with two flip-flops A and B and one input X. When X = 0, the state of the circuit remains the same. When X = 1, the circuit goes through the state transitions from 00 to 10 to 01 to 11, back to 00, and then repeats. Show the state transition by 7-segment display decoder using a. D-Flip Flop-Section B b. T-Flip Flop-Section A c. JK-Flip Flop-Section B d. RS-Flip Flop-Section A

Answers

Answer:

see your answer in picture with detail

please mark me brainlist

Explanation:

The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer by connecting it to the console port on the router. You've configured the management interface with a username of admin and a password of password. What should you do to increase the security of this device

Answers

Explanation:

the best thing to do is to create a personal password with a two time passcode for better security of the device

how computer network reduce the cost of computer hardware? explain with example.​

Answers

Answer:

The biggest advantage of computer network is that the hardware components such as printers memory etc. can be shared by multiple computers. Hence it reduces the hardware cost of an organization

Answer:

One main method computer networking reduces the cost of computer hardware through the sharing of hardware component and resources including printers, faxes, memory space for data storage, processor, graphics capabilities, and internet access devices both locally, within a building and across sites

Computer network allows the sharing of a single resource mentioned above with several other computers, such that a single unit of each resource can be used by members of the same organization

Computer network also reduces the cost of additional space required where each computer is connected to its own components

Explanation:

It is used to select specific menu options, drag and drop options and to draw something on screen.

Answers

Answer:

A mouse.

Explanation:

An input device can be defined as any device that is typically used for sending data to a computer system.

Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, scanner, projector, mouse, etc.

A mouse is an input device that is designed and used to select specific menu options, drag and drop options and to draw something on screen.

Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI

Answers

Answer:

Serial SCSI

Explanation:

Hot swapping can be defined as a process which typically involves fitting or replacing CD-ROM drive, hard-disk drive, power supply or other peripheral devices while a computer system is powered on. Thus, it allows for the installation or removal of a peripheral device from a computer while power is still being supplied to the computer i.e without having to shutdown the computer.

Serial SCSI is a SCSI standard which allows for the technique known as “hot swapping” because it's a point to point connection that is designed to move data to and from computer storage serially.

which route would be used to forward a packet with a source ip address of 192.168.10.1 and a destination ip address of 10.1.1.1?

Answers

Considering the available options, the route that would be used to forward a packet with a source IP address of 192.168.10.1 and a destination IP address of 10.1.1.1 is "O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0"

What is Route in IP address?

IP routing generally transmits packets from one network to another host on another remote network.

The process of IP routing involves evaluating routing tables to specify the following hop address of the packet that should be sent.

IP Routing in this case

Considering the IP address in the question, the best match is the route in the routing table that contains the highest number of far-left matching bits.

Hence, in this case, it is concluded that the correct answer is "O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0"

The available options are:

C 192.168.10.0/30 is directly connected, GigabitEthernet0/1

S 10.1.0.0/16 is directly connected, GigabitEthernet0/0

O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0

S* 0.0.0.0/0 [1/0] via 172.16.1.1

Learn more about IP Routing here: https://brainly.com/question/6991121

Can someone answer this, I'll mark u the brialintest

Answers

Answer:

d

Explanation:

Decimal equivalent of "D" = (D) 13 × 16^1

how to stop programs from running at startup windows 10?

Answers

Just go into settings, type in startup apps, and it will take you to an area where you can select certain apps to start or not start when you reset / shut down / turn off your computer and turn it back on again.

define the term malicious program

Answers

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

Is there any quantum computer in India?​

Answers

yes, Qulabs was one of the first quantum computing startups in India.

What happens when you drag a file from the Documents folder on the hard drive to the Pictures folder on the hard drive?

Answers

Answer:

The file changes its location within your hard drive while the file itself remains unchanged

Explanation:

The file's location will change from C:\Users\username\Documents to

C:\Users\username\Pictures

what is the working principle of computer?​

Answers

Answer:

input, process, output, storage

You have a website that accepts input from users for creating customer accounts. Input on the form is passed to a database server where the user account information is stored. An attacker is able to insert database commands in the input fields and have those commands execute on the server. Which type of attack has occurred

Answers

Answer:

SQL injection

Explanation:

SQL (Structured Query Language) Injection, are vulnerabilities associated security of SQL web interface through which an attacker can intrude into the backend of a database by modifying the queries a web program sends to the database to which it is connected

Examples of SQL injection include: Subverting application logic, which uses modified queries to alter the logic of an application. UNION attacks, which allow the retrieval of data from different tables within a database. Retrieving hidden data, which allows the attacker to have additional query results through modification of a SQL query.

_______________: a group of people working together to achieve specific goals.
a.
Grapevine
b.
Compatible
c.
Lateral
d.
Organization


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

Organization

Explanation:

The other words have unrelated definitons to the definition given.

Answer:

organization

Explanation:

edge 2021

A _____ is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.

Answers

Answer:

A cellular network is a network...

filters cannot perform what action on collected data?

Answers

Answer:

am at 50/50

Explanation:

filters cannot be perform to include shopping preferances.

To insert a row, right-click the row below where you want to insert a row and then click on ____ the shortcut menu. A. Columns B. Insert C.Rows D.Cells​

Answers

Answer:

I think it's insert. (It's the only one that actually makes sense).

Explanation:

Hope that helps. x

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online

Answers

a malware is any program designed to do harm

Explanation:

a malware (malicious software) is any software intentionally designed to cause damage to a computer,server, client or computer network.

which computer belongs to the first generation?​

Answers

ENIAC (Electronic Numerical Integrator and Calculator .)

1. It manages the computer's memory and processes, as well as all of its software and hardware.
A. Application software
C. Graphical User Interface
B. Computer Operating System
D. Micro Computer ​

Answers

Answer:

B. Computer operating system

Explanation:

the operating system (or OS) manages all of the hardware and software in the computer, and allows hardware and software to communicate.

We can also figure this out by process of elimination: Application software is just a fancy way to say apps, Graphical User Interface (or GUI) are menus that allow a user to use the computer through a visual representation (what you interact with using your mouse), and microcomputer just means a small computer like a laptop or a phone.

Write a program that outputs "Hello World!".

Answers

print(“Hello World!”)

I hope this helps :) I’m sry is this what you wanted or were you looking for something else because I’m willing to help either way.
Other Questions
Deandre can run 5 miles in 30 minutes. How many minutes per mile is that? Which method of farming in the South offered poor white and African American farmers the most control oftheir labor and harvest?A. plantation farmingB. sharecroppingC. share-tenancyD. tenant farming If 4 men working 4 hours for 4 days complete 4 units of work, then how many units of work will be completed by 2 men working for 2 hours per day in 2 days. Nama prinsip kerja mouse adalah Which of the following excerpts from "The Neglected Senses" BESTillustrates the typical first-person point of view used by memoir writers?A. I was surprised by the ease and harmony the blind students hadwith their physical realm and was eager enough to understand it that atSabriye's suggestion I agreed to let myself be blindfolded and ledthrough the streets of Lhasa by two blind teenage girls, Choden andYangchen.B. Choden, a year younger that Yangchen, was pink-cheeked and eversmiling. She too wore a ponytail, plaid flannel shirt, denim jacket andpants, baseball cap, and hiking boots.C. Yangchen, the older of the two, interjected nervously, "Cane? Well,no. Maybe no cane. Choden must have her own cane. Otherwise shecan lose the road."D. All the blind students spoke this way--"We are watching you. Nice tosee you. See you again. Please let me see that book." For them, thevocabulary of vision was metaphorical, a symbolic representation ofhuman connection, interest, and concern. Sample information: 24 out of 1000 people who were surveyed had type 2 diabetes. Use the above sample information and construct two confidence intervals (one with confidence level of 90% and the other one with confidence level of 99%) to estimate the proportion of people who have type 2 diabetes. What is the relationship between the confidence level and the size of the confidence interval? Is this significant? Why is it important to understand this concept? What is the volume of 6 moles of hydrogen gas, H2 (g) The scatterplot shows the number of bedrooms in a house and the selling price for that house.Calculate the residual for the house with 6 bedrooms, to the nearest thousand.The residual for the house with 6 bedrooms is ___-30k-26k26k30k Plz plz help me look the photoplz help asap i will give brainliest Answer the following questions using 125 words or more:Write about the similarity of the original comic to the enlargement. How similar are they and how can you tell? What would cause differences in the two pictures? If you drew another comic using a grid, is there anything you would do differently?What would happen if you reduced the comic's size rather than enlarged it? Would the process be the same? What would you do differently?Link to video 2min https://media-release.glynlyon.com/g_mat08_ccss_2016/4/media/html5/anm_scale_drawing_comic_project/media/video.mp4 Which of the following is the correct Lewis structure diagram for Sodium (Na)? (2 points)Select one:a. The letters Na with one dot b. The letters Na with two dots c. The letters Na with three dots d. The letters Na with four dots Select point B, and drag it. As you drag B, circle AB changes. Verify that you can make circle AB coincide with AC. Return B to its approximate initial position. When circle AB coincides with circle AC, what do you notice about the regions CAD and EAF? In terms of similarity, what does your observation imply about the relationships among the lengths of the radii of AB and AC and the lengths of arc EF and arc CD? Write the relationship in the form of a proportion, and explain how it follows from your observation. Shana is creating persuasive speech about supporting diabetes research, she is deciding what support to put in her speech. She decides to put in an emotional statement from someone who has lost a child to the disease. What does this endorsement add most to her speech? The weight (in pounds) and height (in inches) for a child were measured every few months over a two-year period. The measurements are given in the table.Using technology, what is the equation for the least-squares regression line?y= 34.13 1.98xy = 1.98 34.13xy = 17.37 0.50xy = 0.50 17.37xI think it's (C) y = 17.37 0.50x --> 100% The assumption that a person who goes to a community college cannot afford to attend a four-year college is an example of a) generalization. b) discrimination. stereotyped image. D) tolerance. What is the volume of the pyramid shown below? name the importance of cohesive and adhesive forces in transpiration A soccer field has a perimeter of 326 metres. Its area is 6370 square metres. What are the dimensions of the field? Is Water and kerosine a mixture While youre at the top of the tower(50 meters), you see an ant walking along the edge of the building. If the ant were to walk straight down the side of the tower until it reached the ground, how far would the ant travel? Which trigonometric ratio would you use to find this distance? Use the ratio to find the measurement.