1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
3 years ago
14

Help?

Computers and Technology
1 answer:
denpristay [2]3 years ago
6 0

In stead of going number arithmetic, you could also approach it as string handling. Replace the last lines of your code (right after the scan statement) with:


String s = Integer.toString(num);

System.out.println("Here are the digits: ");

System.out.println(s.charAt(0)+"\n"+s.charAt(1)+"\n"+s.charAt(2));

You might be interested in
Assume that isIsosceles is a bool variable, and that the variables isoCount, triangleCount, and polygonCount have all been decla
Leona [35]

Answer:

if (isIsosceles) {

 isoCount++;

 triangleCount++;

 polygonCount++;

}

Explanation:

The above will work in C/C++/Java/JavaScript, but you didn't specify which language you need. Anyway the principle stays the same.

6 0
3 years ago
Kiera is building a new computer and wants to make sure she has an adequate power supply for all the new equipment she is purcha
VikaD [51]
700w power supply is very adequate
7 0
3 years ago
Read 2 more answers
Write a question that the database will understand. Which records are not equal to 5? < 5 > 5 > =5 < > 5
Novay_Z [31]

Answer:

In the given question the option "<5, >5, and < >5" is not equals to 5.

Explanation:

In this question the option "<5, >5, and < >5" is not equal to 5. That can be described as:

  • In the following options, the value that is 5 is less than, greater than and less than greater than that means all option is not equal to 5.
  • In these options, only the third option is equal to the value.

That's why the answer to this question is "<5, >5, and < >5".

4 0
3 years ago
Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis
dusya [7]

Answer:

The features that required to protect the privacy should be:

  1. Protection of User name and Password
  2. Protection of Finger print and other bio metric information if collected from user.
  3. Protection of Personnel Information such as contact information, Identity information if collected.
  4. Protection of data shared such as pictures and videos.

Explanation:

Privacy protection is required to different websites that are involved in collection of different information from users such as user name, password, contact information, account information and messengers. These websites could be website of some bank, online mailing platforms, online shopping platform and social media platforms. These all are used to share and gather our personnel information for different purposes. To ensure the protection of user data they signed a document with users at the time of making account.

The above mentioned are the features that should be included in privacy protection of the website. As all mentioned features are personnel for every user and should be protected from hackers.

3 0
3 years ago
Ok so I usually don’t do this but I just need an answer , on Instagram a notification popped up while I was watching someone’s s
statuscvo [17]

Answer:

I think it was about cheaper ads on Instagram and how they are lowering their prices.

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • select three types of school which specifically emphasize learning through creativity, self expression, and play
    10·2 answers
  • Nadia would like to find text in her current document that differentiates CompanyABC from companyabc. Which option should she us
    8·2 answers
  • A(n) _______ allows an attacker to use a network structure to send large volumes of packets to a victim.
    5·1 answer
  • 1. compression
    11·1 answer
  • Presses the Schedulr app icon Selects the list item for CSCI 448 Presses the "View Classroom on Map" button While only performin
    11·1 answer
  • Describe the 3 different types of authentication
    6·2 answers
  • What connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the
    5·2 answers
  • (Print distinct numbers) Write a program that reads in integers separated by a space in one line and displays distinct numbers i
    8·1 answer
  • Name the first mechanical computer​
    11·1 answer
  • Dynamics simulate stillness via calculations performed by the computer.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!