1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Komok [63]
3 years ago
10

Write a program that calculates and displays the number of minutes in a month. This program does not require any user input, and

you can assume 30 days are in a month. NOTE: If you want to be an overachiever, you can prompt the user to enter in the number of days in the month since we know that in reality not all months have 30 days.
Computers and Technology
1 answer:
dimulka [17.4K]3 years ago
4 0

Answer:

Code to the answer is shown in the explanation section

Explanation:

import java.util.Scanner;

public class Question {

   public static void main(String args[]) {

     Scanner scan = new Scanner(System.in);

     System.out.println("Please enter the days of the month: ");

     int daysOfMonth = scan.nextInt();

     int minuteOfMonth = daysOfMonth * 60 * 24;

     System.out.println(minuteOfMonth);

   }

}

// 60 represents the number of minutes in one hour

// 24 represents the number of hours in a day

You might be interested in
What is top down design? a. Top down design is a way of designing your program by starting with the biggest problem and breaking
Paladinen [302]

Answer:

The answer is "Option a".

Explanation:

This design is the breakdown for a structure to smaller components to recognize the textural functionalities. This system analysis the built-in the top-down style, that defines and it does not describe some first-level components, which is often known as a staggered layout, and wrong choices can be described as follows:

  • In option b, It is wrong because it is not used in web pages.
  • In option c, It does not start with individual commands, that's why it is incorrect.
  • In option d, It is wrong because it uses loops and classes, but it can't decompose the problem.

6 0
3 years ago
Which two features could be added to a game using an "if () then " block
mafiozo [28]

The two features could be added to a game using an "if () then " block are:

  • Using nested If Then blocks.
  • Checks the specific Bid quantity for the instrument.

<h3>What does the If Then block mean?</h3>

The If Then block is known to be the outputs one of  a given two values, that is as a result of  the value of a Boolean input.

Note that  the input value  is very important and as such, The two features could be added to a game using an "if () then " block are:

  • Using nested If Then blocks.
  • Checks the specific Bid quantity for the instrument.

Learn more about game  from

brainly.com/question/1786465

#SPJ1

3 0
2 years ago
After a security incident is verified in a SOC, an incident responder reviews the incident but cannot identify the source of the
oksian1 [2.3K]

Answer:

Option A i.e., SME for further investigation.

Explanation:

Following the reports of such a security incident into an SOC, an incident respondent examines the incident but could not determine the cause of that same incident as well as establish an appropriate response protocol. The ticket for an incident must be applied to SME for even more inquiry. So, the following answer is correct.

5 0
3 years ago
does an access control list looks for patterns of traffic between multiple packets and takes action to stop detected attacks?
Kryger [21]

The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

<h3>What is the access control list?</h3>

An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.

Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Learn more about the access control list here:

brainly.com/question/13718195

#SPJ4

5 0
1 year ago
how can i stop this stupid thing from sending me emails because my school decides to not give you a block option
tekilochka [14]

Answer:

If it on g mail you go to the spam box and then press the spammers to account and then press block and then you will block them.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Discuss the differences between dimensionality reduction based on aggregation and dimensionality reduction based on techniques su
    13·1 answer
  • A _________ consists of a set of computers that interconnect by means of a relatively unsecure network and makes use of encrypti
    5·1 answer
  • Sanjay is giving a slideshow presentation on his entire college class and he is feeling quite nervous in order to share his pres
    9·1 answer
  • Carlos own a hardware store.He currently is not using any software to track what he has in the store. .In one to two sentences,
    10·1 answer
  • Special effects are added using the _____.
    16·1 answer
  • PLEASE HELP ME ANSWER AS MUCH AS YOU CAN I ONLY HAVE 3 POINTS LEFT AND IM TIMED. PLEASE TELL ME THE NUMBER AND LETTER. THANK YOU
    5·1 answer
  • Integer indexing array: Weekend box office The row array movieBoxOffice stores the amount of money a movie makes (in millions of
    11·1 answer
  • James has a USB flash drive that he has used at work. The drive needs to be thrown away, but James wants to make sure that the d
    12·1 answer
  • A blogger writes that the new "U-Phone" is superior to any other on the market. Before buying the U-Phone based on this review,
    7·2 answers
  • Which example best demonstrates an impact of computers on the economy?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!