1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darina [25.2K]
4 years ago
14

Write a method called makeStars. The method receives an int parameter that is guaranteed not to be negative. The method returns

a String whose length equals the parameter and contains no characters other than asterisks.
Computers and Technology
1 answer:
Alex Ar [27]4 years ago
3 0

Answer:

   public static String makeStars(int num){

       String stars ="";

       for(int i =0; i<num; i++){

           System.out.print("* ");

       }

       return stars;

   }

Explanation:

A complete java program calling the method makeStars and passing an argument of 5 is given below:

public class num1 {

   public static String makeStars(int num){

       String stars ="";

       for(int i =0; i<num; i++){

           System.out.print("* ");

       }

       return stars;

   }

   public static void main(String[] args) {

       System.out.println(makeStars(5));

   }

}

You might be interested in
Negative numbers are encoded using the __________ technique. a. two’s complement b. floating point c. ASCII d. Unicode
OLEGan [10]

Negative numbers are encoded using the two’s complement technique. Two's complement is used to encode negative numbers.

Option  A is correct .

<h3>What method does the in data type use to store negative numbers?</h3>

Most implementations you're likely to encounter store negative signed integers in a form known as two's complement. Another important way of storing negative signed numbers is called one's complement. The one's complement of an N-bit number x is basically defined as x with all bits inverted.

<h3>What is encoding method?</h3>

An encoding technique is the application of established industry conventions to a coded character set to create a coded character scheme. Such rules determine the number of bits required to store the numeric representation of a given character and its code position in the encoding.

Learn more about two complement technique encoding :

brainly.com/question/26668609

#SPJ4

5 0
1 year ago
What is the size of a typical business card?
tino4ka555 [31]
A- 3.5 x 2 ...................................................
6 0
3 years ago
Read 2 more answers
An Administrator is preparing to deploy change set into the production environment. Until the deployment is complete, only user
ivann1987 [24]

Answer:

Assign all other users a custom profile with reading access to all objects revoked and add a custom homepage message

Explanation:

Until the deployment is complete, no user other than the user with System administrator profile should be allowed to access data in the production system.

In such a case, the administrator can assign all other users a custom profile with reading access to all objects revoked and add a custom homepage message.

8 0
4 years ago
Describe the steps to play a presentation the way your audience will see it. A)Go to the View tab and select Editing View. B)Go
Sonbull [250]

C) Go to the View tab and select Slide Show.

Explanation:

Steps for Slide Show View to Deliver a Presentation:

  • Go to the Slide Show view from the Task bar at the bottom of the slide window.
  • Use the Slide Show view to deliver your presentation to your audience.
  • Slide Show view occupies the full computer screen.

5 0
3 years ago
How do you change your age on here? I accidentally put that i was 15 but i am only 13. How do I change this?
oksano4ka [1.4K]
I honestly don't think they can or just change your account from what I know of I just tried just now to see for you. I think you jus gotta leave it lol. I'm 13 too I lit myself 16
5 0
3 years ago
Other questions:
  • True or False? A supervisory control and data acquisition (SCADA) device is a computer that controls motors, valves, and other d
    13·1 answer
  • ___ apps can allow you to lock your mobile device and sim card remotely.
    15·1 answer
  • What does the shell of a operating system do?
    11·1 answer
  • Do URLs identify the location of Web content?
    8·2 answers
  • Need answer Quick!!!!!
    10·1 answer
  • Which of the following describes a potentially damaging computer program that affects, or infects, a computer negatively by alte
    9·2 answers
  • Write a program that computes the minimum, maximum, average and standard deviation of the population over time for a borough (en
    6·1 answer
  • The given SQL creates a Movie table with an auto-incrementing ID column. Write a single INSERT statement immediately after the C
    12·1 answer
  • Debug the program so it prints the factorial of a positive integer entered by the user. This is calculated by multiplying all th
    9·1 answer
  • Alguien me podria ayudar a hacer este codigo porfavor? en php Desarrolle el código que solicite los datos (desde teclado) Nombre
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!