1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trapecia [35]
3 years ago
8

Consider the classes below: public class TestA { public static void main(String[] args) { int x = 2; int y = 20 int counter = 0;

for (int j = y % x; j < 100; j += (y / x)) { counter++; } } } public class TestB { public static void main(String[] args) { int counter = 0; for (int j = 10; j > 0; --j) { ++counter; } } }
Computers and Technology
1 answer:
Natali5045456 [20]3 years ago
8 0

Answer:

Option d (neither a or b is true) is the correct answer for the above question.

Explanation:

Missing information : The options and the main question (which is true from the following) is not mentioned in the above question.

There is a two program given in the above question and asked to justify the true statement. The options descriptions are as follows:-

  • Option a states that the value of a counter variable will not be the same for both the program, which is not correct because both program loop will be executed 10 times only and the value of the counter will also be 10.
  • Option b states that the value of j will not be different for both the program which is also not correct because the first program loop will process from 10 to 1 by the difference of 1 but the second for loop will execute for i value from 0 to 90 by the difference of 10.
  • Option c states to right for both the option which is not correct.
  • Option d states to wrong for both the correct option. Hence option d is the correct answer.
You might be interested in
Which statement about technology before the invention of the printing press is true?
marta [7]

Answer: See explanation

Explanation:

You didn't give the options to the question and I searched and couldn't find the particular question.

Here, are some of the things about technology before the invention of the printing press.

1. Before printing press, monks copied books such as bibles as they'll copy calligraphy and illustrations in order for them to spread the messages in the Bible across to people.

2. Before printing press, oral communication was the way that people communicated with each other.

3. Drawings and writings were done by hand before printing press.

4. Before the invention of printing press, in order to transcribe books, different materials that were used include wax, parchment, clay and papyrus.

8 0
3 years ago
In the CPT manual, the digits of the Category III codes are not intended to reflect the placement of the code in the Category I
dexar [7]

Answer:

Nomenclature

Explanation:

In the CPT manual, the digits of the Category III codes are not intended to reflect the placement of the code in the Category I section of the CPT Nomenclature .

3 0
3 years ago
What can be done in order to secure a WLAN/wireless access point?
polet [3.4K]

Answer:

this may help "Change default passwords. ...

Restrict access. ...

Encrypt the data on your network. ...

Protect your Service Set Identifier (SSID). ...

Install a firewall. ...

Maintain antivirus software. ...

Use file sharing with caution. ...

Keep your access point software patched and up to date."

Explanation:

4 0
3 years ago
over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. you need a way to track w
Nuetrik [128]

One way to track who made these changes to the virtual machine cloud settings and when is to: D. enable cloud resource activity auditing.

<h3>What is a cloud?</h3>

In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources such as physical hardware through virtualization and over the Internet, so as to enable the storage and sharing of files and documents virtually and in real-time.

In this scenario, we can reasonably infer and logically conclude that one way to track who made these changes to the virtual machine cloud settings and when is to enable cloud resource activity auditing because it would provide a log of actions such as information about the engineer who made configuration changes.

Read more on a virtual machine here: brainly.com/question/12060797

#SPJ1

Complete Question:

Over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. You need a way to track who made these changes and when. What should you do?

A. Enable virtual machine API integration.

B. Rotate the cloud access keys.

C. Deploy an OSI layer 7 firewall.

D. Enable cloud resource activity auditing.

7 0
1 year ago
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such
finlep [7]

Answer:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms.

Explanation:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms. Where a Rootkit provides features like remote access to users, it also opens ways for attackers. It helps in hiding the malicious software. Rootkits can be installed on the victim systems by phishing attack or social engineering techniques ..

6 0
3 years ago
Other questions:
  • Using Word, Maureen is writing an outline of a presentation she plans to give to her company. She will be showing a video during
    6·2 answers
  • Create a view named product_summary. This view should return summary information about each product. Each row should include pro
    13·1 answer
  • Write a program that prints the Grade based on the given data. 95-100: A+ 90-94: A 80-89: B+ 70-79: B 60-69: C+ 50-59: C &lt;49
    9·1 answer
  • Asking questions when something is unclear is part of
    5·1 answer
  • Given two variables , first_place_winner and second_place_winner, write some code that swaps their associated values. use any ad
    12·1 answer
  • Consider a classful IPv4 address 200.200.200.200? What is its implied subnet mask? If we take the same address and append the CI
    12·1 answer
  • I need help ASAP please
    8·2 answers
  • Anyone has any ideas for a gaming setup i can buy for christmas. Something with high framing rates (monitor included) for about
    15·1 answer
  • Please help...........​
    6·2 answers
  • Firestick optimizing system storage and applications loop
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!