1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
3 years ago
9

Write a complete Java program called Stewie2 that prints the following output. Use at least one static method besides main. ////

////////////////// || Victory is mine! || \\\\\\\\\\\\\\\\\\\\\\ || Victory is mine! || \\\\\\\\\\\\\\\\\\\\\\ || Victory is mine! || \\\\\\\\\\\\\\\\\\\\\\ || Victory is mine! || \\\\\\\\\\\\\\\\\\\\\\ || Victory is mine! ||
Computers and Technology
2 answers:
valina [46]3 years ago
5 0

//////////////////////

|| Victory is mine! ||

//////////////////////

|| Victory is mine! ||

//////////////////////

|| Victory is mine! ||

//////////////////////

|| Victory is mine! ||

//////////////////////

|| Victory is mine! ||

mixer [17]3 years ago
4 0

Answer:

// here is code in java.

import java.util.*;

// class definition

class Solution

{

// main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // declare and initialize string pattern

       String patt1="//////////////////////";

        // declare and initialize string pattern

       String patt2="|| Victory is mine! ||";

       // both patterns are printed alternatively

       for(int x=0;x<10;x++)

       {

        // first print pattern 1

           if(x%2==0)

           System.out.println(patt1);

            // then print second pattern

           else

           System.out.println(patt2);

       }

   }catch(Exception ex){

       return;}

}

}

Explanation:

Declare and initialize two strings patterns.As there are first pattern on every even line and second pattern on odd line. Run the loop for 10 time and print the pattern based on the position of lines.

Output:

//////////////////////

|| Victory is mine! ||

//////////////////////

|| Victory is mine! ||

//////////////////////

|| Victory is mine! ||

//////////////////////

|| Victory is mine! ||

//////////////////////

|| Victory is mine! ||

You might be interested in
When you use the .net data provider objects to retrieve data from a database, you can store the data in an object called a?
Ainat [17]
Data set is the object that you can store data.
6 0
3 years ago
A news report says that company XYZ network was attacked by outsiders, who apparently sent a lot of spoofed ARP requests/respons
GaryK [48]

Answer:

False

Explanation:

Mac address a physical addresses of digital devices, hard-coded to the communication interface as a unique identifier.

ARP or address resolution protocol is a layer 2 protocol used by switches to determine the MAC address of host devices by send a broadcast message through all ports in the switch.

ARP spoofing attack is done within a network, whereby an attacker changes the Mac address to receive data meant for another target host. With this, a remote access to the switch is used to establish an ARP cache poisoning attack.

4 0
3 years ago
I got a kahoot! Totally random pls join!<br><br> Code 08408519!
OlgaM077 [116]

Answer:

say less

Explanation:

5 0
3 years ago
Read 2 more answers
What term describes one or more characters following the last period in a filename, such as .exe, .txt, or .avi?
elixir [45]

Answer:

Explanation:

.exe: is a file extension, means file that contain executable program which can be run by Microsoft windows.

.txt: is also file extension which contains text (characters).

.avi: means (audio video interleave) is a file extension, which contains audio and video data encoded.

3 0
3 years ago
10
Dmitrij [34]

Answer:

i need more \\

Explanation:

Chemical cold packs should be used for bone and joint injuries because they are generally colder than ice and stay cold longer.

A.  

True

B.  

False

Reset

4 0
3 years ago
Other questions:
  • After Intel faced strong shifts in technologies, such as cloud services, social networking, mobile devices, etc., Intel realized
    11·1 answer
  • If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standa
    14·1 answer
  • What statement best describes what a circle graph shows
    13·1 answer
  • Employers and recruiters rarely use the Internet to search for personal details about applicants.
    9·1 answer
  • Mila received a new DVD player that she is trying to connect to the back of her television by feel alone. The first stage of mem
    11·1 answer
  • What occurs when an application sends user-fed data directly to a web browser without authenticating or deleting the content? Cr
    15·1 answer
  • Which of the following contains hardware systems similar to the affected organization but does not host live data?
    13·1 answer
  • What word describes a violation of copyright laws? What rights do copyright holders have over their work of art
    5·2 answers
  • Which job qualifications are typical for someone who wants to work in Information Support and Services?
    8·2 answers
  • Which source would provide the best way to find valid information about climate change
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!