Answer:
C.
Explanation:
A line graph can show how both the movie and the novel are compared to each other. It can give a visual of both mediums of the story rather than one or the other. Hope this helped :)
Answer:
import java.util.Arrays;
import java.util.Scanner;
public class num4 {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("How many numbers? ");
int n = in.nextInt();
int []intArray = new int[n];
//Entering the values
for(int i=0; i<intArray.length;i++){
System.out.println("Enter the numbers");
intArray[i]=in.nextInt();
}
System.out.println(Arrays.toString(intArray));
int min =intArray[0];
for(int i =0; i<intArray.length; i++){
if(min>intArray[i]){
min = intArray[i];
}
}
System.out.println("The Minimum of the numbers is "+min);
}
}
Explanation:
- Using Java programming language
- Prompt the user for the number of values
- Using Scanner class receive and store in a variable
- Create an array of size n
- Using an for loop continuously ask the user to enter the integers
- Print the array of integers
- Using another for loop with an if statement, find the smallest element in the array of numbers
- Output the the smallest number
<span>Olfactory memory tends to be the most durable. Surprisingly, smells tend to be the most strongly related with memories. This has been shown by people being able to associate smells with events for longer periods than any other sensory input. Most other inputs only stay in memory for a period of milliseconds, up to 2-4 seconds at the most.</span>
Cryptography, like digital signatures, is used to accomplish nonrepudiation, which also includes services for authentication, auditing, and logging.
Digital signatures in online transactions make assurance that a party cannot later dispute the sending of information or the validity of its signature. Alice can encrypt the communication using her own Private Key. As a result, only her public key, which she is aware Bob (and everyone else) has access to, may be used to decrypt her message. Bob receives the message, and he uses Alice's public key to decrypt it. Secret key cryptography (symmetric encryption): To encrypt and decrypt given messages, both the sender and the receiver must use the same key.
Learn more about information here-
brainly.com/question/15709585
#SPJ4