1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
2 years ago
14

9.2 code practice edhesive

Computers and Technology
1 answer:
Pavlova-9 [17]2 years ago
6 0

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

    String NAME[]= new String[5];

    Scanner s1= new Scanner(System.in);

 System.out.println("Enter Array Elements(Names)");

 for( int i=0; i <= 4; i++)

 {

     NAME[i]= s1.nextLine();

 }

 System.out.println("Array Elements(Names)");

 for( int i=0; i <= 4; i++)

 {

    System.out.println(NAME[i]);

 }

 

}

}

Explanation:

We need to write a program in java to explain the array declaration. And we have that program in the answer section.

You might be interested in
What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
ss7ja [257]

Answer:

Brute Force attack.

Explanation:

A network is a platform where end user devices like computers are connected to communicate and share resources. There are public networks and private networks.

A public network has its end devices and servers configured with a public IP address, which is routable on the internet, while private networks uses private IP addresses which can be used on the internet.

Private networks can be made accessable to public users by configuring an authentication and authorization policy, which could be one or a multi factor authentication. These requires a password and other factors to access the services of a private network.

An attacker can easily access a one factor or a password accessible user account, if the password is weak by using the process called a brute Force attack.

The brute Force attack exploits the vulnerability of weak passwords by entering possible valid combination from a defined set of possibilities.

6 0
3 years ago
In photoshop what should you consider when determining a projects purpose and objectives?
Darina [25.2K]

Answer:

Identify the purpose, audience, and audience needs for preparing image,Identify three phases that might appear in a project plan. When planning your design project you might include on an outline the goals.

4 0
2 years ago
In which phase of website design does the designer create a mock-up aimed at the target use
alexdok [17]

Answer:

The answer is design.

Explanation:

I know this because based off the notes it states that "the designer can use a model or mock-up to illustrate the look and feel, to help gain a better understanding of the necessary elements and structures.

3 0
2 years ago
Why would students most likely need to collect data? Check all that apply
n200080 [17]
Well I would think all of them in some way. For the first one, students need to collect data (whether it’s mathematical, scientific, etc.) to answer a question. For the second one, they may need to know how much money is in there bank account or they may need to calculate a sale to order the item. For the third one, they may need statistical data to support a position. For the last one, a student could use technological data to be able to solve their problem sorting documents.
5 0
3 years ago
Read 2 more answers
Interviews should never feel like an_________Instead, they should feel like a________
Rainbow [258]

Answer:

blank 1: interrogation

blank 2: getting to know

Explanation:

4 0
2 years ago
Other questions:
  • When you append a(n) ____ to a command, the command is run in a background process?
    8·1 answer
  • The color band that represents tolerance on a resistor is the?
    11·1 answer
  • Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive). Sample output w
    12·1 answer
  • A bicycle combination lock has four rings with numbers 0 through 9. Given the actual numbers and the combination to unlock, prin
    13·1 answer
  • Write a program to convert a fraction to a decimal. Have your program ask for the numerator first, then the denominator. Make su
    10·1 answer
  • Which of the following access control techniques allows the user to feel empowered and able to change security attributes?
    5·1 answer
  • Which option should Gina click to edit the text contained in a text box on a slide in her presentation?
    13·2 answers
  • Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Referenc
    7·1 answer
  • A class is a type of object that defines the format of the object and the actions it can perform. True False
    14·1 answer
  • How has the widespread shift to remote work caused businesses to reconsider their use of Extended Reality (XR)?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!