1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
3 years ago
14

Help?

Computers and Technology
1 answer:
denpristay [2]3 years ago
6 0

In stead of going number arithmetic, you could also approach it as string handling. Replace the last lines of your code (right after the scan statement) with:


String s = Integer.toString(num);

System.out.println("Here are the digits: ");

System.out.println(s.charAt(0)+"\n"+s.charAt(1)+"\n"+s.charAt(2));

You might be interested in
Which Internet protocol (IP) packet fragmentation header field specifies where the fragment belongs in the original datagram
Yanka [14]

An Internet protocol (IP) packet fragmentation header field which specifies where the fragment belongs in the original datagram is the fragment offset.

<h3>What is the TCP/IP model?</h3>

The TCP/IP model is known as the Internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model and it can be defined as a standard framework that is designed and developed for the transmission (prepare and forward) of information on the Internet.

In the TCP/IP model, a fragment offset simply refers to an Internet protocol (IP) packet fragmentation header field which is used to specify where the fragment belongs in the original datagram.

Read more on Internet protocol here: brainly.com/question/17387945

#SPJ1

8 0
2 years ago
Tim is a project manager. He is brainstorming with his team about problems that could arise during the next phase of the project
Grace [21]

Answer:

b.

Explanation:

just took the quiz

8 0
2 years ago
8.10 LAB: Convert to binary - functions Write a program that takes in a positive integer as input, and outputs a string of 1's a
Korvikt [17]

Answer:

// This program is written in C++ programming language

// Comments are used for explanatory purpose

// Program starts here

#include <iostream>

#include <string>

using namespace std;

// Declare variables

int inputvar;

// Declare output variable as array

int outputvar[32];

// Set a counter for binary array

int i = 0;

while (inputvar > 0) {

// Divide inputvar by 2 and store remainder in outputvar

outputvar[i] = n % 2;

inputvar/=2;

i++; // increment i by 1

}

// End of division

// Prin resulting array in reverse order

for (int j = i - 1; j >= 0; j--) {

cout << outputvar[j];

}

return 0;

}

// End of Program

3 0
4 years ago
Discuss what technologies you might see in use at an enterprise. For example, where would you most likely see fiber-optic Ethern
kvv77 [185]

There are various connectivity technologies that we use to connect. They are Ethernet, Internet (Wireless Connection), Bluetooth, Wi-Fi and Cellular.

Explanation:

  • Ethernet is the direct connection among the devices that are located close to each other in a building. This is used for small scale enterprises.
  • Wi-Fi lets wireless connections among multiple devices without any physical connection. And it is most extensively used in most of the corporate companies.
  • Bluetooth is used to transfer the data from one device to the other when they are near.
  • Cellular is used to connect people across the globe. And it is used widely in every enterprises.
7 0
3 years ago
L
Artist 52 [7]

Answer:

I tried, I falid, I sorry :(

Explanation:

......

5 0
3 years ago
Other questions:
  • Which cloud computing service model gives software developers access to multiple operating systems for testing?
    5·1 answer
  • In a @return tag statement the description:
    13·2 answers
  • Describe how data center storage applications drive the development of SAN technology.
    8·1 answer
  • Identify a data type applied in an input element to create slider controls.
    13·1 answer
  • Draw the hierarchy chart and then plan the logic for a program that calculates a person’s body mass index (BMI).
    11·1 answer
  • The calcCircleCircumf() method invoked within in the CircleStatsTester class is overloaded. Write the overloaded methods in the
    8·1 answer
  • What are digital forensic techniques? A. Identifying, extracting, and evaluating evidence obtained from digital media such as co
    11·1 answer
  • Hey does anyone know the name of that movie where like this teenage girl is chilling at her house then there is an outbreak of s
    6·1 answer
  • Look at (c), is it accurate? ​
    9·2 answers
  • What are software applications?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!