Answer:
//Define class
public class Main {
//define main method
public static void main(String[] args)
{
//declare and initialize the double type variable to 128
double mexico = 128;
//declare and initialize the double type variable to 323
double us = 323;
//declare and initialize the integer type variable to 0
int yr = 0;
//set the while loop to check which is greater
while (mexico < us)
{
//increment in the variable by 1
yr++;
//initialize in the variables acc. to the percentage
mexico *= 1.0101;
us *= 0.9985;
}
//print the following results
System.out.println("Population of the Mexico will be exceed the population U.S. in " + yr + " years");
System.out.println("Population of the Mexico will be " + mexico + " million");
System.out.println("and population of the U.S. will be " + us + " million");
}
}
<u>Output</u>:
Population of the Mexico will be exceed the population U.S. in81 years
Population of the Mexico will be 288.88435953355025 million
and population of the U.S. will be 286.0198193927948 million
Explanation:
<u>Following are the description of the program</u>.
- Firstly, we define the class 'Main' and inside it, we define the main method.
- Then, declare two double data type variables which are 'mexico' and 'us' and initialize in it to 128 and 323.
- Declare integer data type variable 'yr' and initialize in it to 0.
- Set the while loop and pass the condition to check that the variable 'mexico' is less than the variable 'us' then, increment in the variable 'yr' by 1 and multiply the variables 'us' and 'mexico' by the following percentage.
- Finally, print the following results with the message.
The answer would be Yoga.
Yoga's emphasis on breathing and the mind/body/spirit connection also yields strong emotional benefits.
Answer:
Explanation:
Statement is correct . It will prompt one to enter an number in string format .
The number entered is converted into an integer
Answer:
c. honeypot
Explanation:
A honeypot is a computer or a network used to mimic the actual target of a cyberattack. It is also used to detect attacks on the network and divert them from the real network. This is used to gain insight into how cyberattacks are carried out. With such knowledge, robust security systems can be put in place.
Windows 2000 only supported
standard format. It is group of legitimate keys, subkeys, and important in the
registry that supports the files and contains backups of its data is called
registry. On versions of Windows that
support the latest format, the following hives still use the standard format:
HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE\SAM, HKEY_LOCAL_MACHINE\Security, and
HKEY_USERS\.DEFAULT; all other hives use the latest format.