1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
4 years ago
7

Given an int variable datum that has already been declared, write a few statements that read an integer value from standard inpu

t into this variable.
Computers and Technology
1 answer:
Zina [86]4 years ago
3 0

Answer:

Following are the  Statement in the Java Language .

Scanner out = new Scanner( System.in); // creating the object

datum = out.nextInt(); // Read the integer value bu using the instance of scanner class

Explanation:

In the Java Programming Language The scanner class is used for taking the user input from the standard input The definition of scanner class is java.util package means that if you taking the input by using scanner class firstly importing the predefined package i.e Java.util.

The description of the above code is given below

  • Scanner out = new Scanner( System.in);: This statement created the instance "out" of the scanner class which is used for taking the input.
  • datum = out.nextInt(); : This statement taking the integer input and store them into the datnum variable.
You might be interested in
Write the names of different types of communication.​
nasty-shy [4]

Answer:

There are four types of communication: verbal, nonverbal, written and visual.

7 0
3 years ago
Read 2 more answers
What layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for defining a way to interpret
sweet-ann [11.9K]

Answer:

The data-link layer

Explanation:

The physical layer and data-link layer are often confused a lot especially in terms of what they do in the TCP/IP 7 layer protocol. The physical layer as the name suggests represents the physical devices like the cables and the connectors that join or interconnect computers together. This layer is also responsible for sending the signals over to other connections of a network. The data-link, on the other hand, translates and interprets these sent binary signals so that network devices can communicate. This layer is responsible in adding mac addresses to data packets and encapsulating these packets into frames before being placed on the media for transmission. Since it resides in between the network layer and the physical layer, it connects the upper layers of the TCP/IP model to the physical layer.

3 0
4 years ago
In the program below, which two variables have the same scope?
bagirrra123 [75]

Answer:

rhymeWord

Explanation:

correct answer edge 2020

3 0
3 years ago
Read 2 more answers
Which of the following allows the transmission of voice and often video communication over the internet?
spin [16.1K]
Voice Over IP (VOIP) is the option that allows the transmission of voice and often video communication over the Internet.
So, this doesn't refer to mobile or other telephone communication, but rather to the Internet solely. Applications that are examples of this type of technology are Skype, Teamspeak, Ventrilo, and others. This technology is becoming better and better with each day and will probably replace phones completely in the future.
8 0
3 years ago
Describe how pseudocode makes programming more efficient for large programming tasks.
Talja [164]

Answer:Pseudocode helps us understand tasks in a language-agnostic manner. Is it best practice or suggested approach to have pseudocode creation as part of the development lifecycle? For instance:

Identify and split the coding tasks

Write pseudocode

Get it approved [by PL or TL]

Start Coding based on Pseudocode

Explanation: use phrasing tool if you want to write in your own words.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Part 2: students and courses, part 1  java review you may use an ide or a text editor, but i will test this by compiling and ru
    6·1 answer
  • Which of the following are examples of the concept of layered access in physical security? Select one: a. Firewall, IDS, CCTV b.
    11·2 answers
  • _____ creates a border or space that separates information.
    14·1 answer
  • How to make all cells the same size in excel?
    15·1 answer
  • Define a pointer variable named daco that can be used for objects of the class Banana.
    14·2 answers
  • What is the available vector for each resource and the need matrix for each thread. Note that an available vector depicts the qu
    11·1 answer
  • Given the code as follows: main() { int i = 3, n; float x; x = i; n = 8 % x; } What problem will occur? Group of answer choices
    12·1 answer
  • I need help with the last question pleasee help me guys .
    11·2 answers
  • PLEASE HELP ASAPP!!
    7·1 answer
  • Which of the following is the key business objective behind the technologies implemented by PCL Construction, as discussed in th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!