Answer:
<em>public static void printLarger(double sales1, double sales2){</em>
<em> if (sales1>sales2){</em>
<em> System.out.println(sales1+" is larger");</em>
<em> }</em>
<em> else {</em>
<em> System.out.println(sales2+" is larger");</em>
<em> }</em>
<em> }</em>
<em>A complete code calling the printLarger method is given below</em>
Explanation:
<em>public class Larger{</em>
<em> public static void main(String[] args) {</em>
<em> int sales1 = 100;</em>
<em> int sales2 = 120;</em>
<em> printLarger(sales1,sales2);</em>
<em> }</em>
<em>public static void printLarger(int sales1, int sales2){</em>
<em> if (sales1>sales2){</em>
<em> System.out.println(sales1+" is larger");</em>
<em> }</em>
<em> else {</em>
<em> System.out.println(sales2+" is larger");</em>
<em> }</em>
<em> }</em>
}
The variables must begin with a letter of the alphabet, a dollar sign or a underscore. After the first character you may add numbers as well. All special characters besides the dollar sign and underscore and not allowed in variables.
There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
It was the Osborne 1 made by Adam Osborne in 1981.