FOR ANYONE THAT WANTS TO STUDY AND CHILL SCREENSHOT BEFORE KATLE DELEATES THIS
meeting id: 932-8097-2909
password: z99LtX
Explanation:
Answer:
Communication is a constant process and it can also be corrupted.
Explanation:
Communication is the ability to send and receive messages that can be understood. We constantly communicate with our environment verbally and or orally, using signs and language to express ourselves.
Messages sent can and should be decoded for communication to be complete. It can be corrupted on its path to the decoder, this hinders understanding.
Intranet is the answer to this question.
Google definition: An intranet is a network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization.
Complete Question:
Write a do-while loop that continues to prompt a user to enter a number less than 100, until the entered number is actually less than 100. End each prompt with a newline. Ex: For the user input 123, 395, 25, the expected output is:
Enter a number (<100):
Enter a number (<100):
Enter a number (<100):
Your number < 100 is: 25
Answer:
import java.util.Scanner;
public class num8 {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
int n;
do{
System.out.println("Enter a number (<100):");
n= in.nextInt();
}while(n>100);
System.out.println("Your number < 100 is: "+n);
}
}
Explanation:
Using Java programming language
Import the scanner class to receive user input
create an int variable (n) to hold the entered value
create a do while loop that continuously prompts the user to enter a number less than 100
the condition is while(n>100) It should continue the loop (prompting the user) until a number less than 100 is entered.
Answer:
The answer is "Option A".
Explanation:
The elliptical curve cryptography system needs much shorter keys for cryptography, and it is very powerful because of the RSA cryptography method. It is also known as a key of 1024-bit, which is in comparison is equal to the 160-bit ECC key for cryptographic, that's why other options are not correct, which is defined as follows:
- In option B, It is higher the ECC key system, that's why it's wrong.
- In option C, It is a part of the RSA system but its value doesn't match the ECC system, that's why it is wrong.
- In option D, It's valued is just double to the RSA system, that's why it is wrong.