1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry_Shevchenko [17]
2 years ago
7

what is wrong with the following code? string s; system.out.println(s); group of answer choices the line, string s;, will cause

an error. system.out.println should be replaced with system.output.println you cannot print a string without setting its value. the line, system.out.println(s); should use a scanner. variables cannot be printed.
Computers and Technology
1 answer:
hodyreva [135]2 years ago
3 0

The error in your Java program is described as follows:

You cannot print a string without setting its value.

<h3>How to print a string in Java?</h3>

There are multiple ways to print a string in a Java, but one of them is using the system.out.println(string) command, which prints the string and gives a new line.

However, for this method, and any other, the string has to be set before it is printed, which does not happen for this problem. There should be a line setting the string like the example:

s = "ABC";

Hence the correct option regarding the error is given as follows:

You cannot print a string without setting its value.

More can be learned about Java programming at brainly.com/question/18554491

#SPJ1

You might be interested in
What type of data causes concern for institutions are businesses Lincoln elected stored and not secured properly
Kobotan [32]

The type of data which causes concern for institutions or business when collected, stored, and not secured properly is Personal Identifying Information. The correct option is B.

<h3>What is personal identifying information?</h3>

A personal identifying information is the representation of data or information  of an individual that can be used to identify an individual specifically.

Some examples of a personal identifying information includes Social security number (SSN), E-mail address, Driver's license number. Bank account number, Full name and Passport number.

Business organizations should secure personal identifying information  properly, in order to avoid unauthorized access by hackers.

Thus, the correct option is B.

Learn more about personal identifying information.

brainly.com/question/4997276

#SPJ1

6 0
2 years ago
Which is an example of the operation of a game?
SVEN [57.7K]

Answer:

D.  

The player uses a joystick to control the character.

Explanation:

The MEANING of operation is: "The fact or condition of functioning or being active."

This explains that the answer is D because you are using the joystick to control the character. Hope the helps.

6 0
3 years ago
Read 2 more answers
The library Wi-Fi kiosk requires a symmetric connection to the Internet. Which WAN technology would probably be the least expens
kenny6666 [7]

Answer:

The answer is IP-sec.

Explanation:

0.75 miles of range is a low distance for a WAN (Wide Area Network) so a point-to-point WAN tehcnology such as IP-sec or SD-WAN can be preferred. But the least expensive option would be choosing IP-sec as specified in the question.

I hope this answer helps.

6 0
3 years ago
More a poster appealing people to be aware <br>against bullying​
Leya [2.2K]

Answer:

Cool

Explanation:

5 0
3 years ago
What was your favorite animals, game, photo, friends,
Blizzard [7]

Answer:

Ojalá que lo sepas no se lo has your favorite #datazo

Explanation:

Ojalá que te ayude

5 0
3 years ago
Read 2 more answers
Other questions:
  • One of the earlier applications of crypto-graphic hash functions was the storage of passwords to authenticate usersin computer s
    13·1 answer
  • In Python please:
    15·1 answer
  • Which access object(s may be used when creating a lookup field to select valu?
    8·1 answer
  • Hilda is troubleshooting a problem with the encryption of data. at which layer of the osi reference model is she working?
    5·1 answer
  • In what year was the 1st zelda game released
    5·2 answers
  • A large IPv4 datagram is fragmented into 4 fragments at router 1 to pass over a network with an MTU of 1500 bytes. Assume each f
    15·1 answer
  • With a(n) ______, a search engine will show ads that have the keyword typed exactly as the searcher used, but may also have othe
    6·1 answer
  • What is the iterative procedure of recursive and nonrecursive?
    10·1 answer
  • PLS HELP WITH MY PYTHON HW ILL GIVE YOU BRAINLIEST
    12·1 answer
  • is the practice of using the internet to provide healthcare without going to a doctor’s office or hospital.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!