1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Levart [38]
3 years ago
10

Write a method that will receive 2 numbers as parameters and will return a string containing the pattern based on those two numb

ers. Take into consideration that the numbers may not be in the right order.
Note that the method will not print the pattern but return the string containing it instead. The main method (already coded) will be printing the string returned by the method.

Remember that you can declare an empty string variable and concatenate everything you want to it.

As an example, if the user inputs "2 5"

The output should be:

2
3 3
4 4 4
5 5 5 5
Computers and Technology
1 answer:
Kipish [7]3 years ago
5 0

Answer:

The purpose of the Java compiler is to translate source code into instructions  public static void main(String[] args)  Arity is the number of arguments passed to a constructor or method or the number ... and objects, which are the focus of object-based programs.  Remove the 2 from between the square brackets to make.

Explanation:

You might be interested in
Can you help me solve this challenging activity?
diamong [38]

Answer:

user_age = int(input())

if user_age > 17 and user_age != 25:

   print("Eligible")

else:

   print("Not eligible")

Explanation:

3 0
2 years ago
What level of system and network configuration is required for cui?
andrey2020 [161]

The level of system and network configuration is required for Cui will be "Moderate confidentiality".

  • The data that really should be safeguarded or disseminated under appropriate regulations, rules, and conservative government objectives or guidelines, would be considered as CUI.
  • The FISMA demands CUI Fundamental to somehow be safeguarded somewhere at the FISMA Conservative category and may even be labeled as CUI as well as regulated.

Thus the above answer is right.

Learn more:

brainly.com/question/14083709

4 0
3 years ago
Ok so I know this is the most random question to ask on brainly, but does anyone know how to copy on placement in sims 4 for pc?
pochemuha

Answer:

yes i do i will tel you if you put brainlist

Explanation:

3 0
3 years ago
Read 2 more answers
What is a utility application that monitors the network path of packet data sent to a remote computer?
stepladder [879]

Answer:

"Traceroute " is the  correct answer.

Explanation:

The traceroute commands in the networking that traces the network path The  traceroute is also displaying the information about the pack delay that is sent over the internet."Traceroute is also known as tracepath it means it calculated the path between the packets in the network. Traceroute takes the one IP address of the computer machine and taking another Ip address to calculate the path between the packets.

Traceroute Is a type of utility application that monitors the network between the packet that is sent into a remote computer.

7 0
3 years ago
Who created the word robot?
victus00 [196]

Answer:

Karel Čapek      Science Diction: The Origin Of The Word 'Robot' Robot is a relative newcomer to the English language. It was the brainchild of the Czech playwright, novelist and journalist Karel Čapek, who introduced it in his 1920 hit play, R.U.R., or Rossum's Universal Robots.

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Why isn't my rank move from ambitious to virsto i met all the requirements
    8·2 answers
  • A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: The name of the clie
    11·1 answer
  • The command button to protect a document is part of the​.
    10·1 answer
  • How many bits would be needed to count all of the students in class today there is 20 students
    6·1 answer
  • Which command will display each line in the text file based on the alphabet?
    10·1 answer
  • How can I make a website login system with only using php?​
    6·1 answer
  • How come I haven't moved to the next rank even though I have all of the right things to move on?
    10·2 answers
  • 8.7 lesson practice question 1
    13·1 answer
  • with the current computer development, explain 5th areas where computer is applied for the social economic dwvelopment in societ
    11·1 answer
  • ________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!