1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slava [35]
3 years ago
7

Please check my answer! (Java)

Computers and Technology
1 answer:
nlexa [21]3 years ago
3 0

Correct, you're looking for an outer loop that loops from 0 to 15, and an inner loop from 0 to 50.

You might be interested in
I need help ASAP Please! :)
amid [387]
Your parents,your school,google,your social media accounts
3 0
3 years ago
Describe at least two ways social media has impacted cybersecurity.
dybincka [34]

Answer:

Its Providing Too Much Personal Information since you will be using social media to promote your own small business, you need to take extra precautions. For starters, don’t leave a trail of breadcrumbs for social media hackers. Whether you are representing yourself or your company, avoid sharing stuff like your date of birth, places where you have attended school, as well as names and pictures of your family members.

Disgruntled Employees

While it’s fairly normal for your employees to vent about working for your company, in doing so, they may inadvertently reveal more than they should. It’s a lot more common than you think, since 98% of all employees are using at least one social media platform, and as much as 50% of those are talking about their respective companies. Whether they are sharing sensitive info or posting pictures from their workplace, they may end up sharing something that might hurt your business.

Explanation:

7 0
3 years ago
Random number between 0 and 5 (inclusive)
____ [38]

Answer:

3

why though???????

^_________^

7 0
3 years ago
Read 2 more answers
. Which of the following is NOT a
joja [24]

Answer:

solution

Explanation:

The correct option is - solution

Reason -

To solve a problem,

Firstly we give input , then system will process that input which then gives output.

Solution is not a part of the process.

So, Solution is not a significant part of a simple problem.

7 0
3 years ago
How the delete key is used​
max2010maxim [7]

Answer:

i guess to delete words and to erase stuffs from the computer

Explanation:

hope it helps : )

3 0
4 years ago
Read 2 more answers
Other questions:
  • To edit the text in a smartart graphic, what must be done first ?
    7·2 answers
  • Which keyboard command can be used to delete an image from one slide while adding it to the clipboard so that it can be added in
    5·2 answers
  • Clep allows students to do all of thw following except which?
    9·2 answers
  • Personal Area Network (PAN--
    10·1 answer
  • 3. Matthew captures traffic on his network and notices connections using ports 20, 22, 23, and 80. Which port normally hosts a p
    14·1 answer
  • For the Address Block 195.200.0.0/16 a. If you have 320 Customers that need 128 addresses/customer - will there be enough addres
    14·1 answer
  • Why are computers assigned IP addresses
    15·1 answer
  • A user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file se
    15·1 answer
  • Is Missouri a free state or a slave state​
    13·2 answers
  • What is the output of the first and second print statements?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!