Answer:
import java.util.Scanner;
public class Main {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.println("Enter an integer");
int num = input.nextInt();
int i=1;
while( i*num < 100) {
System.out.println(i*num);
i++;
}
input.close();
}
}
Explanation:
If you want the value 100 to be included, change the < to <=.
<span>A cryptographic key is a string of bits that would be used by a cryptographic algorithm to change plain text into a cipher text. </span>
Answer:
the first option is obviously the correct answer
Answer:
False
Explanation:
<em>"The weakest link in the security of an IT infrastructure is not a server, it is a internet that is weakest link. Because connecting your device or computer to internet immediately exposes them to attack. Through intrusion detection system (IDS) we can examine IP data stream for common attack and malicious intent patterns." </em>
Answer:
Zoom lens is my best guess
Explanation:
Zoom lenses have variable focal lengths AND zoom capabilities, on the other hand, telephoto lenses have a fixed focal length, which would not be useful for this scenario since he wants to take pictures of objects at different focal lengths.