Answer:
b
Explanation:
if you look at the end of the code it brings c back but for it to do that it has to make a newline.
Answer:
import java.util.Scanner;
public class LargestSmallest {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.print("Enter 10 integers: ");
int num = in.nextInt();
int i = 1;
int min = num, max = num;
while (i < 10) {
num = in.nextInt();
if (num > max) max = num;
if (num < min) min = num;
i++;
}
System.out.println("Largest number: " + max);
System.out.println("Smallest number: " + min);
}
}
Explanation:
A Java application that inputs a series of 10 integers and determines and prints the largest and smallest integer is written above.
Server computers are mostly used for internet porpoises, because server computers are carrying websites or game servers, while the client computer is actually just connecting to the server computer's network and accesses for example websites saved and uploaded on the server computer.
The correct answer to this open question is the following.
The regulation of security and trustworthiness on the Internet is likely to develop into more security practices that can guarantee people, the investors, the common citizen, that their information, transactions, and private life are protected. The government has to play a big and key role in demanding companies to install the proper security protocols in their systems in order to protect the information of their clients. Definitely, now more than ever, cybersecurity is a major concern for everybody.
The private sector must improve trust online. Indeed, CEOs of major companies such as Faceb*ok had been questioned by members of US Congress regarding the way they handle private data and they also have questioned that social media site in the long-questioned Russian intervention in the 2016 US elections. Without a doubt, governments have to step in more to have the proper legislation that enforces companies the correct handling of personal data. The public's confidence on the Internet has declined and they are looking for answers in different types of alternatives, including other infrastructures because they are afraid that their personal information could be in hands of people that have different intentions than the simple trade interaction.
The standard program that uses common views such as the icon view, list view, and details view would be the program known as "File Explorer" (Windows) or "Finder" (Mac). This program uses all the views to make selecting and tracking down certain files a much more painless and easier process to complete.
Hope this helps and good luck! :)