What is the output of the following program? (Show your work)
int x = 3, y = 2;
System.out.println("x = " + y);
x = 5 + y * 7 % 3;
y = x - y * x - 3 / 2;
System.out.println("x = " + x);
System.out.println("y = " + y);
Answer:
x = 2
x = 7
y = -8
Explanation:
int x = 3; (here the variable of type int called x is declared and given the value 3)
int y = 2; (here another variable of type int called y is declared and given the value 2;
System.out.println("x = " +y ); (this instruction will print the value of y in the console terminal but deceivingly saying that the value belongs to x variable. So whoever reads will read "x = 2" instead of "x = 3" which would be the correct value associated with x.
x = 5 + y * 7 % 3; (here the value of x is changed from 3 to 5 + y * 7 % 3. What this means is that the first value of y (2) is multiplied by 7 and then get the mod of division 14 / 3 which is 2. Then added to 5. So the final result is 7 which is now the new value of x)
y = x - y * x - 3 / 2 (same as the above but for the value of y: here - 2 is multiplied by 7 and - 3 is divided by 2. Now we have 7 - 14 - 1.5 which is -8.5 but since you specified the variable type was an int and not double or float, then the program ignores significant numbers, so it ignores the .5 or whatever comes after the point instead of rounding it. PS: [So for instance if the result was 8.9, the value printed would be 8])
System.out.println("x = " + x); (prints the new value of x but this time it does not deceive the reader)
System.out.println("y = " + y); (prints the new value of y, and the letter y is shown in the screen for the first time with the correct value associated)
What areas does ABET provide accreditation?
students
programs
institutions
teaching staff
industries
It is a form of quality assurance for programs in the areas of applied and natural science, computing, engineering, and engineering technology. Our accreditation is recognized globally as evidence that a program meets the standards set by its technical profession.
"We are a nonprofit, non-governmental agency that accredits programs in applied and natural science, computing, engineering and engineering technology." - ABET
Question 14 of 20
"Businesses around the world all need access to the same data, so there
needs to be one type of information system that is designed to offer it." Why
is this statement false?
O A. This statement is false because there already is only one type of
information system.
B. This statement is false because the data that the Internet
produces is never the same.
1
O C. This statement is false because different businesses have
different information needs.
O D. This statement is in fact correct; this is where the field of
information technology is heading.
SUBMIT
Answer:
This statement is false because there already is only one type of
information system.
suggest me anime genre : adventure ecchi
Digital photography occurred in what age?
Answer:
The history of digital photography as we know it began in the 1950s. In 1951, the first digital signals were saved to magnetic tape via the first video tape recorder. Six years later, in 1957, the first digital image was produced through a computer by Russell Kirsch.
Que compone una maquina Rube Goldberg (operadores mecánicos- maquinas simples – mecanismos)
Answer:
dominoes, fans, PVC pipe, magnets, duct tape, marbles, cups or bowls, miniature toy cars, paper towel tubes, string.
------------------------------------------------------------------------------------------------------------
dominó, abanicos, tubos de PVC, imanes, cinta adhesiva, canicas, tazas o cuencos, carros de juguete en miniatura, tubos de toallas de papel, cuerdas.
Explanation:
If you clean your camera’s lens incorrectly, what might you damage?
Group of answers:
1. the aperture port
2. the outer coating
3. the inner coating
4. the battery port
Answer:
2. the outer coating
Answer:
Its number 2 the outer coating
Explanation:
suggest any complete anime......?
Your computer has a software problem. Which of the following will NOT help you fix your 3 issue?
A- remove all media from drives
B- run anti-virus software
C- reinstall the operating system
D- install pirated software
Answer:
D- install pirated software
Explanation:
Installing pirated software (depending on where you get it from) will most likely cause more harm than help.
Good things to keep track of about people in your Career Network include: a. contact information, including how to spell their name. b. how you came to know them (introduced by a friend, at a career fair, search on LinkedIn, etc.). c. notes about your last interaction and plans for your next interaction. d. only a and b above e. all of the above
Answer:
mi pareceres que es la B
Explanation:
An organizations help desk is flooded with phone calls from users stating they can no longer access certain websites.
The help desk escalates the issue to the security team, as these websites were accessible the previous day.
The security analysts run the following command: ipconfig /flushdns, but the issue persists. Finally, an analyst changes the DNS server for an impacted machine, and the issue goes away.
Which of the following attacks MOST likely occurred on the original DNS server?[...]
a. DNS cache poisoning
b. Domain hijacking
c. Distributed denial-of-service
d. DNS tunneling
The distributed denial-of-service (DDoS) attack is known to be a malicious attack. Distributed denial-of-service attacks can mostly likely occurred on the original DNS server.
Distributed denial-of-service often tires to hinder the normal traffic of the said targeted server, service or network by filling up the target or its environment/ infrastructure with a flood of Internet trash.The symptom of a DDoS attack is that the site or service will suddenly run slow or become unavailable. Traffic analytics tools can help one to know the signs of a DDoS attack. DDOS attack can be prevented by switching DNS servers.
Learn more from
https://brainly.com/question/13977863
If a packet gets "sucked down a black hole" (figuratively speaking) and is not received by its sender, and no message is sent back explaining the situation, then something is wrong. The failure to send a message means something is wrong with the _____. ICMP
ISO
TCP/IP
HTTP.
The failure to send a message implies that something is wrong with the ICMP.
What is ICMP in computer networks?ICMP is a term that means Internet Control Message Protocol. It is regarded as a kind of error-reporting protocol or method of network devices.
It can be seen in routers as they are often use to get error messages to the source IP address if their network problems hinders them in terms of delivery of IP packets. The failure to send a message shows that something is wrong with the ICMP.
Learn more about ICMP from
https://brainly.com/question/9473592
A two-dimensional array of ints with 4 rows, has been created and assigned to a2d. Write an expression whose value is the total number of ints that could be stored in the entire array.
Arrays are used to represent data in rows and columns
The expression that represents the number of int the array can store is 4c
From the question, we have:
The number of rows is given as: 4The number of columns is unknown; assume the number of columns to be c.Also from the question, we understand that the array is of integer type.
So, the number (n) of int the array can store is the product of the rows and the columns
i.e.
[tex]\mathbf{n = Rows \times Column}[/tex]
So, we have:
[tex]\mathbf{n = 4\times c}[/tex]
Multiply
[tex]\mathbf{n = 4c}[/tex]
Hence, the expression that represents the number of int the array can store is 4c
Read more about arrays at:
https://brainly.com/question/14664712
b. Differentiate Operation System from other software. give me 4-5 sentences pls.
Answer:
An operating system or OS is system software that manages computer hardware, software resources, and provides common services for computer programs. All operating systems are system software. Every desktop computer, tablet, and smartphone includes an operating system that provides basic functionality for the device while on the other hand The System software is a type of computer program that is designed to run a computer’s hardware and application programs it controls a computer’s internal functioning, chiefly through an operating system. It also controls peripherals devices such as monitors, printers, and storage devices.
Explanation:
PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS
have you got a computer at home, school or work? what kind is it?how often do you use it? what do you use it for?what are the main components and features of your compuret system?
The answers to the computer system operations and components & features have been detailed below.
A computer is defined as an electronic device that is used for storing and processing data. Let's now answer the questions.;
A) Yes, I have a computer at work. B) My computer at work is used to prepare documents and reports, send and receive emails, prepare drawings e.t.c.C)The main components and features of my computer system are; The motherboard, The central processing unit (CPU), The video card which is the graphics processing unit (GPU), A volatile memory which is known as the Random Access Memory (RAM), Storage device such as Solid State Drive (SSD) or Hard Disk Drive (HDD)Read more at; https://brainly.com/question/10946449
Select the correct answer.
The local authorities indicate that a film crew shooting on an abandoned bridge need to have special permission. Which member of the crew is responsible for acquiring this permission?
A.
location manager
B.
producer
C.
director
D.
set designer
Location manager is a member of the film crew which is responsible for
getting permits from the police and relevant authorities.
The location manager is responsible for finding appropriate locations,
securing permits and giving notice to the neighbors to ensure the smooth
running of the film production.
In this scenario, the film crew known as the location manager will need to
take permission to shoot the movie on an abandoned bridge from the local
authorities.
Read more on https://brainly.com/question/19541645
Laura is confused with the spelling of the word pronunciation. She types the word as pronounciation. Which feature of the Autocorrect tool should she use, so that the word processor automatically corrects it? PLS HELP!!!
One of the most basic agricultural tools is the tractor, which is designed to break up the soil in order to prepare it for planting
False
True
What do people in the movie e.t think about the character E.T
please answer its due in 8:30 PM pleaeee
Answer:
They were scared of him then they felt devotion to him.
Explanation:
A programmer wants to determine whether a score is within 10 points of a given target. For example, if the target is 50, then the scores 40, 44, 50, 58, and 60 are all within 10 points of the target, while 38 and 61 are not.
Which of the following Boolean expressions will evaluate to true if and only if score is within 10 points of target ?
Answer:
(target - 10 ≤ score) AND (score ≤ target + 10)
Explanation:
(target - 10 ≤ score) AND (score ≤ target + 10).
What are Boolean expression?A logical assertion that can only be TRUE or FALSE is known as a Boolean expression. As long as both sides of the expression have the same fundamental data type, boolean expressions can compare data of any kind.
Oracle OLAP evaluates this expression by comparing each value of the variable actual to the fixed value 20,000.
Unless parentheses indicate a different evaluation order, operators with equal priorities are evaluated from left to right. When the truth value has been determined, the evaluation is stopped.
Therefore, (target - 10 ≤ score) AND (score ≤ target + 10).
To learn more about Boolean expressions, refer to the link:
https://brainly.com/question/13265286
#SPJ6
Dom is a software developer who likes to tweak his computer's OS to make it work the way he wants it to. The OS he is most likely to use is _____.
A. Mac
B. Linux
C. MS-DOS
D. Windows
Answer:
Linux
Explanation:
Linux-based operating systems are open-source, and open-source software can be modified. Mac, MS-DOS, and Windows are all closed-source means we can't see the source code hence we can't modify it.
I hope this helps <3
True or False!
Answer
Answer:
1) true
2) true
3) false, domain name, not domain name suffix.
4) true
5) true
6) true
7) true
8) false, ... forgot the other name ...
9) true
10) false, it can also contain pics and vids.
11) true
12) true
13) false, ... can't remember the name ...
14) true
15) true
Biometric access calls for using a(n) __________ physical characteristic of a person to permit access to a controlled IT resource.
Answer:
unique
Explanation:
write the importance of software In computer
Answer:
Microsoft word, Excel, Access, Power point, Microsoft windows...........
Explanation:
Software that communicates with the hardware and allows other programs to run. It is comprised of system software, or the fundamental files your computer needs to boot up and function. Every desktop computer, tablet and smartphone includes an operating system. Common desktop systems include Windows, OS X and Linux.
options:
Application Process
Boot Process
Computer Process
Operating Process
Answer:An operating system, or "OS," is software that communicates with the hardware and allows other programs to run. It is comprised of system software, or the fundamental files your computer needs to boot up and function.
Explanation:
Which statement is true with respect to Java?
A.
Java programs are not compiled, only interpreted.
B.
Intermediate bytecode is created by the JIT.
C.
Bytecode is platform independent.
D.
The JVM creates object code after compiling.
Java is a high level programming language.
The true statement is (c) Bytecode is platform independent.
First, java programs are compiled and interpreted
This means that (a) is not true
Secondly Just-In-Time (JIT) does not create intermediate bytecodes, and Java virtual machine (JVM) does not create object codes.
However, java programs are compiled to an instruction set for the JVM; this instruction set is referred to as the byte code.
And the byte code is platform-independent.
Hence, the true option is (c)
Read more about java programming language at:
https://brainly.com/question/2266606
Answer:
C) Bytecode is platform independent
Explanation:
Just got it right on ASU
Can anyone lend me a computer?
Answer: No
Explanation:
Answer:
no
Explanation:
Activity Sheet 2
A.Illustrate how to create the object below using draw and modify commands.
Answer:
Vjfxfffccvvvvvv
Explanation:
Hgvjhgxxgyjjbvccjkn Hugh bună vvvvhg un www buukbbchfcvbvc. Hggvhhvbhchgx
Why is this happening when I already uploaded files to my drive?
Answer:
u have to upload it to your drive first
Explanation: