1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
My name is Ann [436]
3 years ago
4

Write a statement that assigns numCoins with numNickels + numDimes. Ex: 5 nickels and 6 dimes results in 11 coins. Note: These a

ctivities may test code with different test values. This activity will perform two tests: the first with nickels = 5 and dimes = 6, the second with nickels = 9 and dimes = 0.import java.util.Scanner;public class AssigningSum {public static void main (String [] args) {
int numCoins;int numNickels;int numDimes;numNickels = 5;numDimes = 6;/* Your solution goes here */System.out.print("There are ");System.out.print(numCoins);System.out.println(" coins");}}
Computers and Technology
1 answer:
Rufina [12.5K]3 years ago
4 0

Answer:

The statement that assigns the sum of numNickels and numDimes to numCoins is as follows:-

numCoins = numNickels + numDimes;

System.out.print("There are ");System.out.print(numCoins);System.out.println(" coins");

numNickels = 9;

numDimes = 0;

numCoins = numNickels + numDimes;

System.out.print("There are ");System.out.print(numCoins);System.out.println(" coins");

Explanation:

The first statement in the solution adds the values of numNickels (6) and numDimes (11) ,the rrsult is then saved in numCoins variable

The next line prints the value of numCoins (17) alongside some strings

The next line assigns 9 to numNickels

The next line assigns 0 to numDimes

The next line adds the values of numNickels (9) and numDimes (0) ,the result is then saved in numCoins variable

The next line prints the value of numCoins (9) alongside some strings

You might be interested in
____ is a consistent relational database state in which every foreign key value also exists as a primary key value.​ a. ​ Refere
maria [59]

Answer:

The correct answer is Option A (Referential integrity)

Explanation:

When a relational database table is in ​first normal form, that means it has no repeating fields or groups of fields, and hence all rows have the same columns, while if a relational database table is in second normal form, it implies that every non-key field is functionally dependent on the primary key. If can be in the third normal form if no non-key field is functionally dependent on any other non-key field.​

A relational database on its own is a universal approved database model whose data is stored in tables divided into records and fields that serve as an information unit that organizes data points for easy access.

In the relational database, foreign keys are being checked to reference the primary key and enforce referential integrity so as to ensure that the foreign key must have a matching primary key. It means the reference from a row in one table to another table must be valid. Referential integrity concerns the concept of a foreign key normally enforced by the database management system.

4 0
3 years ago
Redesign the cover of science textbook using at least two different graphics​
Tanya [424]

Answer:

what design do you want, also what design am i redesigning.

8 0
3 years ago
Your Windows PC has an AMD processor installed that includes AMD-V technology and the motherboard fully supports this processor.
hichkok12 [17]

Answer:

The most capable version of Microsoft hypervisor you can install on this machine, provided the computer meets all the other requirements is

(b) Client Hyper-V.

Explanation:

A hypervisor is a software that allows the running of one or more virtual machines on a host machine. Client hyper-v is a type 1 example of a hypervisor for Microsoft 8 and Microsoft 10 and can be run on a computer's hardware.

Client hyper-v uses only hardware assisted virtualization like AMD, AMD-V which allows virtual machines to perform well.

3 0
3 years ago
Read 2 more answers
A ________ is designed for a individual user<br><br>Plz help :)
Natali [406]
It is a Profile (i think)
4 0
3 years ago
Adam Nation holds an executive position at PH Corporation. He has an extensive understanding of networks and telecommunications.
galben [10]

Adam holds chief security officer position.

<h3><u>Explanation:</u></h3>

The chief security officer duties assuring the protection of business systems and emerging plans and defenses upon crimes by hackers and viruses. The significance of this status has grown in the age of information technology as it has shifted more accessible to take delicate company information.

The purpose of a CSO has developed to incorporate overall corporate protection such as a company's personnel and material assets onward with digital and dynamic erudition. A CSO who can lessen friction among departments thus appends a value to an organization.

5 0
3 years ago
Other questions:
  • Let’s say you are given the task of retouching a famous model’s photograph. To what extent will you retouch the image? In your o
    12·2 answers
  • Whats the relationship between cpu memory and disk​
    10·1 answer
  • With only a floor plan to reference, the designer would know what about a window?
    7·1 answer
  • ​What is a combination of one or more related characters or bytes and is the smallest unit of data a user accesses?
    8·1 answer
  • What can a Word user do with the Customize Ribbon dialog box? Check all that apply.
    7·1 answer
  • What is this car first to awnser is the brianliest
    5·2 answers
  • Help me! I’ll mark you brainly
    13·1 answer
  • Which is known as accurate processing of computer gigo E mail MHz bug​
    5·2 answers
  • No spamming or links
    15·2 answers
  • A restaurant recorded the ages of customers on two separate days. You are going to write a program to compare the number of cust
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!