1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
3 years ago
14

Help?

Computers and Technology
1 answer:
denpristay [2]3 years ago
6 0

In stead of going number arithmetic, you could also approach it as string handling. Replace the last lines of your code (right after the scan statement) with:


String s = Integer.toString(num);

System.out.println("Here are the digits: ");

System.out.println(s.charAt(0)+"\n"+s.charAt(1)+"\n"+s.charAt(2));

You might be interested in
Film’s importance in today’s economy?
RSB [31]

Answer:

When a movie or television show shoots on location, it brings jobs, revenue, and related infrastructure development, providing an immediate boost to the local economy. ... The film and television industry supports 2.5 million jobs, pays out $188 billion in total wages, and comprises over 93,000 businesses.

Explanation:

<em>The film industry is estimated to be worth of billions of dollars. Various kinds of people are employed to work as actors, actresses, cameramen, producers, directors, managers and company representatives. It also provides secondary jobs for persons as props, costume designers, caterers, sound, lighting and electronics.</em>

8 0
3 years ago
The most likely reason that company computers connected to the Internet should use anti-virus protection software is..?
gogolik [260]
A big/potent virus could eliminate economic statuses/money, maybe bankrupting the company. 
4 0
3 years ago
Perform depth-first search on each of the following graphs; whenever there's a choice of vertices, pick the one that is alphabet
Vikki [24]

Answer:

See the table attached for complete solution to the problem.

7 0
3 years ago
The exploitation of a buffer-overrun vulnerability in an application will MOST likely lead to:_________
SashulF [63]

Answer:

A. Arbitrary code execution

Explanation:

A buffer-overrun, also known as buffer overflow occurs when a programmer makes an error during coding, which could make his system easily susceptible to attacks from a hacker. The root cause of this problem is an overflow of data in a buffer, and programs that are written in C and C+ + are more likely to be affected by this problem.  When a buffer-overrun occurs, it would most likely lead to arbitrary code execution.

Arbitrary code execution is an uncontrolled and unrestricted coding by the attacker which alters the original coding. The attacker could input more information into the coding, which alters the original information and which would make the application porous and accessible by just anyone. It is important that programmers run regular tests on their programs, so as to detect any coding errors.

8 0
3 years ago
Are Microsoft an Apple more secure from malicious action because of their closed-source approach?
omeli [17]

Yes Microsoft and Apple used the closed-source approach to better secure from malware and make to make their operating systems more user friendly.

7 0
3 years ago
Other questions:
  • For C++ (please make sure it runs properly)
    14·1 answer
  • Talking to a friend _____.
    5·2 answers
  • You need to delegate AD RMS responsibilities to a junior administrator. You don't want to give the administrator more permission
    14·1 answer
  • What's a good app that solves trigonometry problems?
    8·1 answer
  • Which type of computing device is best suited to having a digital pen as an input device?
    9·1 answer
  • Who is a second-degree contact on a professional networking profile?
    12·1 answer
  • Does coaxial cable use radio waves to transmit data
    10·2 answers
  • Clarice is an architect who is involved in design work on a restaurant in a building that used to be part of the city’s water wo
    8·1 answer
  • Four examples of computer virus​
    10·1 answer
  • What can you do to make sure no one outside your company can gain access to its wireless network?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!