1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
4 years ago
5

Given numRows and numColumns, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or 3E. Print

a space after each seat, including after the last. Use separate print statements to print the row and column. Ex: numRows
Computers and Technology
1 answer:
Salsk061 [2.6K]4 years ago
4 0

Answer:

import java.util.Scanner;

public class NestedLoops {

   public static void main (String [] args) {

       Scanner scnr = new Scanner(System.in);

       int numRows;

       int numColumns;

       int currentRow;

       int currentColumn;

       char currentColumnLetter;

       numRows = scnr.nextInt();

       numColumns = scnr.nextInt();

       for (currentRow = 0; currentRow < numRows; currentRow++) {

           currentColumnLetter = 'A';

           for (currentColumn = 0; currentColumn < numColumns; currentColumn++) {

               System.out.print(currentRow + 1);

               System.out.print(currentColumnLetter + " ");

               currentColumnLetter++;

           }

       }

       System.out.println("");

   }

}

You might be interested in
What was the #1 song in 1987 and who was the artist
Veronika [31]
Billboard magazine said it was "Walk Like an Egyptian" by The Bangles.
8 0
3 years ago
Read 2 more answers
Which of the following Office Online apps is most effective for creating spreadsheets?
navik [9.2K]
The answer is C Excel. Excel allows you to make spreadsheets.

Hope this helps :-)
4 0
3 years ago
Read 2 more answers
Which type of firewall policy calls for a firewall to deny all traffic by default?
charle [14.2K]
Restrictive policy is a kind of policy calls for a firewall to contradict all traffic by default. The first rule denies all traffic on any service and using any port. To permit a specific type of traffic, a new rule must be placed ahead of the deny all rule. A firewall should enforce the overall policy recognized by the network administrator. Enforcement is controlled mainly over setting up packet filtering rules which is a rule base comprises a set of these rules. 
3 0
3 years ago
Assume the system with 256B memory and 64B cache and the block size of 16 bytes. I.e., there are 4 blocks in the cache. (a) For
Nataliya [291]

Answer:

Check the explanation

Explanation:

1.

System = 256Byte = 8 bit

Cache = 64B , block size = 16 byte.

A) Direct Mapped Cache:

Block offset = log (Block size) = log 16 = 4bit

Total # of block inside cache = 4.

Therefore index offset = log 4 = 2bit.

Remaining is tag bits.

Therefore tag bits = 8-(4+2) = 8-6 = 2 bits

Tag                              Index offset                                Block offset

(2 bits)                             (2 bits)                                           (4 bits)

Fully associative cache :

In fully associative cache, any of main memory block can be placed anywhere in cache. Therefore index offset =0 bits.

Therefore tag bits = 8-block offset bit= 8-4 =4bits

Tag                               Block offset

(4 bits)                                (4 bits)

4 0
3 years ago
What is Service Operations in ITIL​
Nostrana [21]

Explanation:

the objective of ITIL service operations is to make sure that IT services are delivered effectively and efficiently. the service operation life cycle stage includes the fulfilling of user requests, resolving service failure fixing problems and also carrying out routine operational tasks

7 0
3 years ago
Other questions:
  • What is a taskbar?
    5·1 answer
  • Which of the following is a quick way to restore the arrow pointer after you have used it for drawing?
    5·1 answer
  • Write a function that takes an integer value and returns the number with its digits reversed. for example, given the number 7631
    10·1 answer
  • To save time and avoid formatting errors, you can use the ____ to apply custom formatting to other places in your presentation q
    9·1 answer
  • Of all excavation hazards, _______ poses the greatest risk
    8·1 answer
  • Which online article citation is correctly formatted according to MLA standards?
    15·2 answers
  • Someone please tell me please y my ps4 controller won’t charge:(
    12·2 answers
  • PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST
    14·1 answer
  • The higher the ____________________, the faster the ____________________.
    5·1 answer
  • Testing a website includes visiting every web page on the site and selecting every link, tab, and button available.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!