1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
3 years ago
6

In Java

Computers and Technology
1 answer:
liubo4ka [24]3 years ago
5 0

Answer:

class Main {

 public static String numToText(int digit) {

   String[] numbers = {"zero", "one", "two", "three", "four", "five", "six", "seven", "eight", "nine"};

   return numbers[digit % 10];

 }

 public static void main(String[] args) {

   for(int i=0; i<10; i++) {

     System.out.println(i+" = "+numToText(i));

   }

 }

}

Explanation:

I clip the input on being 0-9 by taking it modulo 10. You could also create error handling for that if desired.

You might be interested in
Windows stores information from the Credential Manager application in secure folders called
Delicious77 [7]

Windows stores information from the Credential Manager application in secure folders called<u> VAULTS.</u>

<u></u>

Explanation:

  • A credential vault is a database used to store passwords and similar cryptographic key material.
  • The most common data stored in a credential vault are current and historical passwords to privileged accounts.
  • All credentials are saved in special folders on the computer, a place called Vaults. Moreover, you can back up all credentials to a file and restore them on to different computer.
  • Vault is a shareware program that acts as a bank vault, or safe, where you can keep you private information or files hidden and secure.
  • Everything in the vault is protected with an advanced encryption, and requires a password (your password) to open the vault to access the information.
8 0
2 years ago
If you are feeling fatigued or sleepy while driving _________________.
vlada-n [284]
The best awnser is D but A is also doable
4 0
3 years ago
Read 2 more answers
Google Ads was constructed around three core principles, focused on helping businesses reach their online potential. The first o
PolarNik [594]

Answer:

True

Explanation:

Google Ads was constructed around three core principles, focused on helping businesses reach their online potential. The first of these is relevance. Google Ads connects businesses with the right people at the right time. The other principle is control and results.

7 0
3 years ago
______ is the software that prevents people from being able to access your personal information.
AleksandrR [38]

Answer:

The answer is A I hope this helps, if not I apologize.

Explanation:

8 0
3 years ago
Read 2 more answers
Why we use cluster computing and hadoop framework for big data sysetm​
Ber [7]

Answer:

Explanation:

Hadoop clusters can boost the processing speed of many big data analytics jobs, given their ability to break down large computational tasks into smaller tasks that can be run in a parallel, distributed fashion.

5 0
2 years ago
Other questions:
  • Emma opened a new document a Microsoft word and typed her assignment. She is now planning to save the documents for the first ti
    11·1 answer
  • Define the following terms:<br><br> - pigment<br> - vehicle<br> - binder<br><br> plz help
    12·2 answers
  • 1. Define a C++ function with the name evaluateBook. The function receives as one argument the name of the file to be processed
    13·1 answer
  • the type() function in python does what when you give it an object. returns the last keystrokes from the user. fill the object w
    9·1 answer
  • Then standard toolbar appears whenever you select text true or fals
    15·1 answer
  • Write an application that displays the strings in the provided array alphabetically in ascending order.
    9·1 answer
  • I love my baby boy and can someone help me with this
    6·1 answer
  • You can put ______ on your phone.
    10·1 answer
  • Read the ages of three people and find the average. Display the result.
    10·1 answer
  • Multiple Select Which of these are ways a hacker might learn someone's password? Select 3 options. o social engineering keylogge
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!