Answer:
import java.util.Scanner;
public class num6 {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
int product=0;
do{
System.out.println("Enter a number");
int num = in.nextInt();
product = num*10;
System.out.println("The product is " + product);
}while (product<100);
}
}
Explanation:
In the Java program above, The user will be prompted to enter a number.
The number is multiplied by 10 and assigned to a variable called product.
A do....while loop has been implemented to check the variable product
As long as this variable is less than 10, the user will be prompted to enter another number.
Not always. If you have text wrapping on, it will snap to the text.
Word wrap is the same as; Soft Return
Word wrap means that you let the; Computer Control when it will go to a new line
<h3>What is Text Wrapping?</h3>
Text wrapping is simply defined as a process used in MS Word to Wrap a Text around an Image.
Now, the way it is done is by selecting the image you want to wrap text around and then On the Format tab, click the Wrap Text command in the Arrange group, then select the desired text wrapping option to wrap the text.
Finally Word wrap is also same as using soft return and letting the computer control when it goes to the next line.
Read more about text wrapping at; brainly.com/question/5625271
Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.
Explanation: