1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Digiron [165]
4 years ago
11

How to set the maximum to 10? Java

Computers and Technology
1 answer:
hichkok12 [17]4 years ago
6 0
Public int setLimit(parameter) {
if (parameter > 10) {
return 10;
} else {
return parameter;
}
}
You might be interested in
To use the mail merge feature in Access, the first step is to start the Microsoft Word Mail Merge Wizard.
Vlada [557]

Answer:

A) True

Explanation:

While working with MS Access, the mail merge feature allows us to quickly pickup records from the database tables and insert them on Microsoft word documents such as letters/envelops and name tags before printing them. The main advantage of a mail merge is the time saved as the process of creating several mailings for different individual letters/envelops is made simple.

The first step in creating a mail merge is starting the Microsoft Word Mail Merge Wizard in MS Access which will guide you in the entire steps, some of these steps include:

1. Selecting the document you wish to work with

2. Switching to MS Word

3. Selecting the the size of the envelope .

4. Selecting the  recipients records from the database table

5. Arranging and inserting records from the database (addresses on the envelope).

6. Review/Preview and Print

3 0
3 years ago
In Linux, the /etc/inittab file describes the processes that are started up during boot up. Each entry in the /etc/inittab file
Softa [21]

Answer:

The answer is "Action".

Explanation:

The directory /etc/inittab file is also known as a configuration file that is used by the System V (SysV) initialization system in Linux. where System V stands for system version that is used for Unix and Linux both. It was developed in AT&T. This configuration file includes three items that are:

  • Runlevel norm
  • Which procedures should you begin, track and restart when you end?
  • Which actions to perform when a new run level is introduced?

Example: id:runlevels:action:process

  • id stands for identification code. It includes a sequence of one to four characters that identify in function.
  • runlevels it is a list that runs on levels in which this applies.
  • action is a specifies code in the field that describes to init how to run the process.  
  • A process is a command that is ready to execute.
3 0
3 years ago
FOR PYTHON 3
VLD [36.1K]

Answer:

Complete Python code with step by step comments for explanation are given below.

Python Code:

# creating a function named scrabble_number that will take num as input argument

def scrabble_number(num):

   # print the original number  

   print("The original number is: ",num)  

   # we can implement the required logic by using python built-in functions join() and zip()  

   scrambled = ''.join([char[1]+char[0] for char in zip(num[::2], num[1::2])])  

   # print the scrambled number

   print("The scrambled number is: " + str(scrambled))  

Driver code:

scrabble_number('123456')

Output:

The original number is: 123456

The scrambled number is: 214365

5 0
3 years ago
Write a Python function isPrime(number) that determines if the integer argument number is prime or not. The function will return
pickupchik [31]

Answer:

def test_prime(n):

   if (n==1):

       return False

   elif (n==2):

       return True;

   else:

       for x in range(2,n):

           if(n % x==0):

               return False

       return True              

print(test_prime(9))

3 0
3 years ago
Landing pages in a foreign language should never be rated fully meets?
PilotLPTM [1.2K]

Answer:

if the landing page provides all kind information of information as to that site people usually like it or will most likely enjoy it

BRAINLIEST?????

Explanation:

3 0
3 years ago
Other questions:
  • The number of bits used to store color information about each pixel is called ____.
    13·1 answer
  • What is the danger in judging someone according to his or her social networking profile
    12·1 answer
  • Assume you're using a 3 button mouse. to access shortcut menus, you would
    6·2 answers
  • The following processes are being scheduled using a preemptive, round-robin scheduling algorithm. Each process is assigned a num
    6·1 answer
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    8·2 answers
  • The _______ of a secondary storage device indicates how much data the storage medium can hold.
    13·1 answer
  • Can anyone give me $2 (Reddem code/Promo Code)​
    15·2 answers
  • Draw a flow chart except the principle, time and date from the user. and display the simple interest and amount as output.​
    9·1 answer
  • 1.what is a computer?
    5·1 answer
  • What is the difference between spyware and adware?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!