1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delvig [45]
3 years ago
9

Clunker Motors Inc. is recalling all vehicles in its Extravagant line from model years 1999-2002 as well all vehicles in its Guz

zler line from model years 2004-2007. A boolean variable named recalled has been declared. Given a variable modelYear and a String modelName write a statement that assigns true to recalled if the values of modelYear and modelName match the recall details and assigns false otherwise. I am doing this in JAVA Programming
Computers and Technology
1 answer:
Aleksandr [31]3 years ago
5 0

Answer:

The following code is written in java programming language:

//set if statement

if (((modelYear >= 1999) && (modelYear <= 2002) && (modelName == "Extravagant")) || ((modelYear >= 2004) && (modelYear <= 2007) && (modelName == "Guzzler")))

{

recalled = true;    //initialized Boolean value

}

else      //set else statement

{

recalled = false; ////initialized Boolean value

}

Explanation:

Here, we set the if statement and set condition, if the value of modelYear is greater than equal to 1999 and less that equal to 2002 and modelName is equal to "Extravagant" or the value of modelYear is greater than equal to 2004 and less than equal to 2007 and the model year is equal to "Guzzler", than "recalled" initialized to "true".

Otherwise "recalled" initialized to "true".

You might be interested in
What does nat stand for? network access trigger network administration timetable network address translation network association
Mars2501 [29]
Perhaps I think its NETWORK ADDRESS  TRANSLATIONS
take care:) 
6 0
3 years ago
You company hired you to build a network. List of technical question that you will ask?
vredina [299]

Explanation:

1. How many computers do you want to connect or how big the network should be?

This would tell us what kind of a network need to be built. It can be LAN/MAN/WAN

2. The location where network needs to be built?

We have to check the geographic condition too before creating a network

3. What is the budget?

Based on the budget only, we can decide the wires to be used if require we can negotiate the budget so that we can create effective network

4. Will I get an additional resources to work?

This is essential to estimate the time that is required to complete the task.

5. When the project needs to be completed?

This is crucial because a business might be planned thereafter.

6 0
3 years ago
In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers'
myrzilka [38]

Answer: True

Explanation: Domain name system(DNS) is the kind of attack that exploits the functioning of the DNS .This process is also known as the DNS spoofing .The corrupted data is invoked in the cache database and thus creates spoof.

It creates diversion of the traffic from the actual servers to the fake servers and entering the exploited data in the cache database.Thus, the given statement is true.

4 0
3 years ago
What is information systems​
maxonik [38]

brainly.com/question/10887381

Answer:You need 7 bits to encode everything that could be typed on this keyboard.

Explanation:

The encoding of the QWERTY keyboard is based on the extended ASCII encoding. The "ASCII" code was created by the "American standards association" in 1963.The acronym of “American Standard Code for Information Interchange” is ASCII. ASCII is a 7-bit  code.

Further Explanation:

The QWERTY keyboard is the standard computer and typewriter keyboard design for Latin-script alphabets. The first six letters of the keyboard's upper row indicate its name.  Christopher Latham Sholes designed the layout of the keyboard for his "Type-Writer".  It was first mass-produced in 1874.

In QWERTY keyboard, extended American Standard for Information Interchange (ASCII) method is used for characters encoding. Alphabetical order of English language is the base of ASCII method of characters encoding.  

Learn More:

Learn more about QWERTY keyboard: brainly.com/question/649081; Answered by: Jessusulas

Learn more about ASCII: brainly.com/question/7851735; Answered by: LearnGrow

Keywords:

QWERTY keyboard, The encoding of the QWERTY keyboard, American Standard for Information Interchange, ASCII

6 0
3 years ago
Perfective maintenance usually is cost effective ____ the system
Svetlanka [38]

Answer:

During the middle of

Explanation:

Perfective maintenance usually is cost effective during the middle of the system.

6 0
3 years ago
Read 2 more answers
Other questions:
  • What microprocessor was the first to be processable<br> ?
    14·1 answer
  • The algorithm credited to Euclid for easily finding the greatest common divisor of two integers has broad significance in crypto
    11·1 answer
  • Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
    10·1 answer
  • Only technical managers needs to know about programming, web view source code and about technology issues.
    12·1 answer
  • What is processing requirement in computer?
    11·1 answer
  • For each of the following application areas state whether or not the tree data structure appears to be a good fit for use as a s
    8·1 answer
  • How has the global marketplace used emerging technologies to expand businesses
    14·1 answer
  • You are making a game! The player tries to shoot an object and can hit or miss it. The player starts with 100 points, with a hit
    13·1 answer
  • Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
    5·1 answer
  • Provide 3to 4 sentence overview of microsoft windows features?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!