1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddika [18.5K]
3 years ago
6

How do I use this without the spring?

Computers and Technology
1 answer:
poizon [28]3 years ago
6 0

Answer:

put a spring in

Explanation:

duuuuuuuu

cy

You might be interested in
Malcolm Movers charges a base rate of $200 per move plus $150 per hour and $2 per mile. Write a program named MoveEstimator that
jeka94

Answer:

import java.util.Scanner;

public class MoveEstimator

{

public static void main(String[] args) {

   

    Scanner input = new Scanner(System.in);

    final int BASE_RATE = 200, RATE_PER_HOUR = 150, RATE_PER_MILE = 2;

    int hours, miles;

    double totalFee = 0.0;

   

 System.out.print("Enter the number of hours for a job: ");

 hours = input.nextInt();

 System.out.print("Enter the number of miles: ");

 miles = input.nextInt();

 

 totalFee = BASE_RATE + (hours * RATE_PER_HOUR) + (miles * RATE_PER_MILE);

 System.out.printf("For a move taking %d hours and going %d miles the estimate is $%.2f", hours, miles, totalFee);

}

}

Explanation:

*The code is in Java.

Create the Scanner object to be able to get input

Initialize the constant values using final keyword, BASE_RATE, RATE_PER_HOUR, RATE_PER_MILE

Declare the variables, hours, miles, totalFee

Ask the user to enter the hours and miles

Calculate the totalFee, add BASE_RATE, multiplication of  hours and RATE_PER_HOUR, multiplication of  miles and RATE_PER_MILE

Print the output as in required format

6 0
2 years ago
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
Select the word or phrase from the drop-down menu to complete each sentence. File names consist of a ______ and a file extension
Law Incorporation [45]

Answer:

base file name, file format, bitmap image

Explanation:

8 0
2 years ago
A variable's ________ describes the kind of values that can be held by the variable, how the variable is stored in computer memo
Shtirlitz [24]
A. Data Type.

Data Types can be integers, strings, chars, shorts, ect, and describes what types of values can be stored.
4 0
3 years ago
A class named clock has two instance variables : hours (type int ) and isticking (type boolean ). write a constructor that takes
Leno4ka [110]
<span>I guess you need it written in Java. So if you need only constructor, then here it is:
public Clock(Clock clock1) {
          this.hours = clock1.hours;
          this.isTicking = clock1.isTicking;
}

This code is 100% correct</span>
3 0
3 years ago
Other questions:
  • What new england industry quickly collapsed with the discovery of oil in pennsylvania
    9·2 answers
  • Identify requirements that should be considered when determining the locations and features of firewalls. What are some importan
    5·1 answer
  • What is a gutter margin?
    5·2 answers
  • Solve the following quadratic equation <br><br>y=6x^2-12x+1
    9·1 answer
  • Which of the following is the shortcut key combination for pasting copied text?
    11·2 answers
  • A man-made world event that would affect the labor market would be a(n) _____.
    13·1 answer
  • etwork behavior analysis system __________ sensors are typically intended for network perimeter use, so they are deployed in clo
    10·1 answer
  • The one who will defeat me in this typing race I will mark the one brainliest:
    5·2 answers
  • Ns.office.com/Pages/ResponsePage.aspx?id=bd8
    9·2 answers
  • Using filtering as a strategy to deal with information overload requires Group of answer choices reviewing all unsolicited infor
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!