1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semenov [28]
3 years ago
8

In the following code, what values could be read into number to terminate the while loop? Scanner keyboard = new Scanner(System.

in); System.out.print("Enter a number: "); int number = keyboard.nextInt(); while (number < 100 || number > 500) { System.out.print("Enter another number: "); number = keyboard.nextInt(); }
Computers and Technology
1 answer:
tia_tia [17]3 years ago
3 0

Answer:

The following code read the numbers in the range of 100 through 500.

Explanation:

The following code is written in Java Programming Language.

Here, firstly create a new Scanner object "keyboard" then, declare an integer variable "number" to "keyboard.nextInt()" and the set the loop while and inside it print the message.

You might be interested in
Where can we buy a cryptocurrency? from below options
dem82 [27]

it would be C

hope this helps!

8 0
3 years ago
What do you remember about the difference between Canadian and US dollar (which one is greater)? Also, explain which online tool
Talja [164]
I’m not sure about USD but Canadian dollars are greater, one dollar CAD is equal to $0.79 US. So $10 CAD is equal to $7.90 US.
8 0
3 years ago
Lindsey also needs to calcite the commissions earned each month. If the company earns $200,000 or more in a month, the commissio
IrinaK [193]

Answer:

srry dont know

Explanation:

8 0
3 years ago
opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use
Alekssandra [29.7K]

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

  1. General Policies
  2. Server Policies
  3. VPN Policies
  4. Back-Up Policies
  5. Firewall Access and Configuration Policies

Cheers!

5 0
3 years ago
Write steps: To open an old documents​
myrzilka [38]

Answer:

1.Click.

2.Choose “All Programs”

3.Then select, the “Microsoft Office” folder.

4.Now, open your desired Office application. 5.for e.g Microsoft Word 2010.

6.Once the application opens, select.

Click.

7.Now, select the document you wish to open in Office 2010 and click.

3 0
3 years ago
Other questions:
  • If Asa changes the text to bold, he has changed the style. True False
    8·2 answers
  • High capacity circuits are limited by the least capable network link, which is typically the user connection. As such, it is imp
    11·1 answer
  • To print a mailing label, click the Labels button on the MAILINGS tab in the ____ group. A. Building Block B. AutoText C. Templa
    10·2 answers
  • How should font appear in a slide presentation compared to the font in a document
    7·1 answer
  • Memory cache is referred to as ______. A. SRAM c. SROM b. DRAM d. DROM
    11·1 answer
  • If you want Nud3s add me on sc Kermit4lyfe1
    11·2 answers
  • I need help ASAP please and thank you!
    6·1 answer
  • What helps you evaluate websites for reliable information?
    15·2 answers
  • Do you think it's easier to be mean online than offline? why?
    14·1 answer
  • What do you think that private information like passwords pin number will be guarded or shared with the public? why?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!