1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
3 years ago
15

_ are NOT likely to stop suddenly.

Computers and Technology
1 answer:
maks197457 [2]3 years ago
7 0
Trains , the answer is D
You might be interested in
Create an application named Percentages whose main() method holds two double variables. Assign values to the variables. Pass bot
lbvjy [14]

Answer:

The codes below implement the problem statements

Explanation:

public class Percentages {

public static void computePercent (int a,int b)

{

System.out.println(a+" is "+(a*100/b)+"% of "+b);    

}

 

public static void main(String []args)

{

int a=2;

int b=5;

computePercent(a,b);

computePercent(b,a);

}

}

<u> </u>

<u>Part(b) </u>

import java.util.*;

public class Percentages {

public static void computePercent (int a,int b)

{

System.out.println(a+" is "+(a*100/b)+"% of "+b);

}

 

public static void main(String []args)

{

Scanner s= new Scanner(System.in);

int a=s.nextInt();

int b=s.nextInt();

computePercent(a,b);

computePercent(b,a);

}

}

8 0
3 years ago
A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considera
Dmitry [639]

Answer:

B. How many programming statements the program contains

Explanation:

If a program is intended to be able to process large amounts of data, then the ability of the program to process larger data sets is heavily affected by

  • execution time
  • size of memory the program requires
  • storage space the program requires as it runs.

The length of the statements the program contains does not much affect program performance.

8 0
3 years ago
Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
Alla [95]

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

8 0
3 years ago
What are 3 things that victims of cyber bullying can experience?​
Dennis_Churaev [7]

Answer: Isolation, Depression, Humiliation.

I hope this helps you out! ☺

3 0
3 years ago
Read 2 more answers
Which mitigation technique would prevent rogue servers from providing false ip configuration parameters to clients?
IrinaVladis [17]
DHCP snooping is a mitigation technique<span> to </span>prevent rogue<span> DHCP </span>servers  <span>from </span>providing false IP configuration parameters to clients.  DHCP snooping<span> is a security feature that acts like a firewall between untrusted hosts and trusted </span>DHCP<span> servers. It is</span><span> a series of techniques applied to improve the security of a </span>DHCP<span> infrastructure. </span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • Select the correct answer.
    6·1 answer
  • Rachel completed typing an official docment with a word processing program. She wants to make sure that her document has no typo
    15·2 answers
  • Given num_rows and num_cols, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or 3E. Print
    8·1 answer
  • Write a loop that continually asks the user what pets the user has, until the user enters "rock", in which case the loop ends. I
    12·1 answer
  • I'm confused. Are , , and elements or nodes? What exactly defines nodes? What defines elements?
    13·1 answer
  • When you touch a hot stove, along which pathway will the impulses travel and what is the final destination in the cns?
    12·1 answer
  • In Windows 7's Jump List, what can we do?
    6·1 answer
  • Select the correct answer from each drop-down menu. What are the effects of emerging technology? has brought the internet to alm
    10·1 answer
  • How does the dns solve the problem of translating domain names like example.com into ip addresses?
    10·1 answer
  • Which are ways that technology keeps you hooked?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!