1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
3 years ago
14

9.2 code practice edhesive

Computers and Technology
1 answer:
Pavlova-9 [17]3 years ago
6 0

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

    String NAME[]= new String[5];

    Scanner s1= new Scanner(System.in);

 System.out.println("Enter Array Elements(Names)");

 for( int i=0; i <= 4; i++)

 {

     NAME[i]= s1.nextLine();

 }

 System.out.println("Array Elements(Names)");

 for( int i=0; i <= 4; i++)

 {

    System.out.println(NAME[i]);

 }

 

}

}

Explanation:

We need to write a program in java to explain the array declaration. And we have that program in the answer section.

You might be interested in
7.1 What is the basic building block of an 802.11 WLAN? 7.2 Define an extended service set. 7.3 List and briefly define IEEE 802
Black_prince [1.1K]

Answer:

7.1)

BSS (Basic Service Set) is a basic building block of  802.11 wireless LAN.

It is the wireless station that executing the similar competing and the MAC protocol for accessing a similar wireless system is shared.

7.2)

The Extended Service Set is one of the basic components of IEEE 802.11 WLAN architecture which increases the mobility range to the individual BSS (Basic Service Set).

An ESS is the set that contains two or more than two Basic Service Sets

that forms an individual sub-network.

7.3)

The IEEE 802.11 service has the MAC layer implement which falls in two categories:

  1. Service Station.
  2. Distribution System Service.

Service Station - 802.11 standard has defined the services which is providing the functions among the stations.

It includes the following components:

  • Authentication
  • Deauthentication
  • Privacy
  • MSDU delivery.

Distribution System Service - It defined by the 802.11, provides the functionality across the distribution system and access point also provides the DSS.

It includes the following components:

  • Association  
  • Disassociation  
  • Distribution  
  • Integration  
  • Reassociation.

7.4)

It either may be or either not be a wireless network.  

Because distribution system has these three things:

  • Wired network
  • Wireless network
  • A switch

7.5)

Association agrees on the set security capabilities to use.

It also allows the mobile node which has made the transition to identifies itself to the AP (Access Point) within a BSS so that's why the nodes can be participated in the data exchanges with  another mobile nodes.

7.6)

The IEEE 802.11i are addresses the three types of security areas:

1) authentication,

2) key management,

3) data transfer privacy.

7.7)

7 0
3 years ago
The printing press helped spread the ideas of the Renaissance.<br> a. True <br> b. False
guajiro [1.7K]
The answer is a. True

The printing press did help spread the ideas of the Renaissance, as it could spread ideas easily, quickly, and in different languages.

6 0
4 years ago
Remote authentication has always been a concern because the person is coming from a public network, and many companies require t
g100num [7]

Answer:

Incomplete Question.

I'll answer this question based on general terms

Explanation:

Two Factor Authentication, abbreviated as 2FA.

It is a type of authentication that requires the presentation of two credentials for access to personal data and information.

The credentials needed for a 2FA are

1. Either of the following; PIN, Password or Pattern

2. Your device or gadget which could be an ATM Card, Mobile Phone

3. Biometrics such as fingerprint, voice input

Number one is often referred to as "Something you know"

Number two is referred to as "Something you have"

Number three is referred to as "Something you are"

The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.

8 0
4 years ago
Read 2 more answers
Multiple Select Which of these are ways a hacker might learn someone's password? Select 3 options. o social engineering keylogge
LUCKY_DIMON [66]

Answers:

-Social Engineering

-Dumpster Diving

-Keylogger

4 0
3 years ago
The utility ___ is a map that connects each possible bundle to the corresponding level of utility that a person gets from consum
docker41 [41]

Answer:

function

Explanation:

Utility depicts the satisfaction that a user gets in consuming a good or service.  It can be in the form of form, time, possession and place.

Utility function is used to measure how a user behaves when they receive or consume a product or service relative to how they behave when they receive other products/services. It is a widely used tool for measuring users' preferences over a series of products/services. It can be thought of as a map that connects each possible bundle of service to the corresponding utility that a person will get from consuming it.

With utility function, companies can track the way their products/services are being viewed by consumers thus allowing them to make logical business decisions.

3 0
3 years ago
Other questions:
  • ________ software helps run the computer and coordinates instructions between other software and the hardware devices.
    7·1 answer
  • Write a program to read customer number, Name, loan amount, interest rate and time of repayment. Calculate and display the EMI .
    9·1 answer
  • "Two technicians are discussing FWD driveshaft service. Technician A says that removal of the driveshaft usually requires partia
    15·1 answer
  • Wrire a code that display elements at indices 1 and 4 in the follwoing array.
    12·1 answer
  • Which feature enables you to make changes to all the slides of your presentation at the same time?
    15·2 answers
  • What is the function of the following shape? display result to user get input from user make a decision process information
    7·1 answer
  • Provide 50000 customers with internet service, however it is only given a pool of 256 ip addresses. suggest an address allocatio
    14·1 answer
  • What do you think entertainment or gaming platforms will look like in the future?
    9·1 answer
  • Marcus traded in his 10-year-old truck for a new one. Because it is the first new truck he
    9·1 answer
  • A hydraulic lift has a mechanical advantage of 5. If the load weighs 350 N, what effort is required to lift the weight? Provide
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!