1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesna [10]
3 years ago
9

Suppose you have an int variable called number. what java expression produces the second-to-last digit of the number (the 10s pl

ace)? what expression produces the third-to-last digit of the number (the 100s place)?
Computers and Technology
1 answer:
Jobisdone [24]3 years ago
8 0
Private int number = 123;
// using this number "123"

int hundred = (number % 10); // gets third to last
number /= 10;
int tenth = (number % 10); // gets second to last
number/=10;
int ones = (number % 10); // first digit

 
You might be interested in
In python 3.17 LAB: Convert to dollars
krok68 [10]

To convert the inputs to dollars and cents, we make use of a combination of multiplication and addition.

The program written in Python where comments are used to explain each line is as follows:

<em />

<em>#This gets input for the number of quarters</em>

quarters = int(input("Quarters: "))

<em>#This gets input for the number of dimes</em>

dimes = int(input("Dimes: "))

<em>#This gets input for the number of nickels</em>

nickels= int(input("Nickels: "))

<em>#This gets input for the number of pennies</em>

pennies= int(input("Pennies: "))

<em>#This converts the amount to dollars and cents</em>

dollars = quarters * 0.25 + dimes * 0.10 + nickels * 0.05 + pennies * 0.01

<em>#This prints the amount to 2 decimal places</em>

print("Amount ${:.2f}".format(dollars))

Read more about Python programs at:

brainly.com/question/22841107

7 0
2 years ago
IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
Veseljchak [2.6K]

Answer:

Spoofing

Explanation:

Spoofing that occurs when an intruder computer fools network into believing its IP address is associated with trusted source

5 0
2 years ago
Kendall receives an email stating that a leading computer company is giving away free computers, asking her to forward the email
gavmur [86]

Explanation:

Kendall should report the email as scam and delete email instead of forwarding it. She should also run her virus protection software as these kind of emails on the Internet are mostly Fraud and can contain virus so the user should avoid them.

8 0
3 years ago
To quickly modify fonts, colors, and effects on a slide, a user can modify the _____. (Microsoft PowerPoint)
velikii [3]

<u>Answer</u>:

To quickly modify fonts, colours, and effects on a slide, a user can modify the Theme.

<u>Explanation</u>:

In Microsoft power point a theme is a group or collection of fonts , colours and effects that are pre-formatted to improve or enhance the presentation. We can  start changing the font , colours or effects or any pre-existing  themes  by selecting them.  

To Change colour:

  • In Design tab,  under the  Variants group, click on  the downward  and choose one colour from the colour variant gallery.
  • Now click on the customise colours which opens the  "Create New Theme Colours" dialog box. In this dialog box , in the  theme colours  we can make the necessary changes and save them as a new theme.

To change fonts:

  • In the View tab, choose Slide Master.In this tab, select "Fonts" and then select Customise Fonts.
  • Now "Create New Theme Fonts" dialog box opens where use can choose the required font size under the Heading font and Body font boxes.  Again this can be saved as a new theme. Changing the font of theme changes all the bullet texts and title.
7 0
3 years ago
In the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long dis
ycow [4]

Answer:

A

Explanation:

4 0
3 years ago
Other questions:
  • What are paragraphs separated by
    9·1 answer
  • In every organization, workers receive and sendinformation daily. The flow of this information should be____________.upward and
    11·1 answer
  • Company XYZ has a new employee named John Anderson. His employee ID is XYZ1234. His email address will be <a href="/cdn-cgi/l/em
    10·1 answer
  • Write a function namedmake_complex that stores its twoarguments (both of type double) in acomplex structure, then returns thestr
    12·1 answer
  • What feature should be used before a document is printed
    8·1 answer
  • Suppose that the following elements are added in the specified order to an empty binary search tree: Kirk, Spock, Scotty, McCoy,
    12·1 answer
  • What kind of skill is persuasion?
    7·1 answer
  • name instances in the past where social media has kept you informed about the latest news around the country​
    15·2 answers
  • When the binary code is retrieved from ram and moved to the cpu, this stage is known as
    8·1 answer
  • At a commercial quick charge station, a fully depleted 87 kwh battery in 2023 ariya can be charged from 20% to 80% in about ____
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!