1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kumpel [21]
3 years ago
13

JAVA

Computers and Technology
1 answer:
Leokris [45]3 years ago
8 0

Answer:

Answer provided in screenshot, not really too happy with my implementation but it works.

Explanation:

Iterate through months, handling logic for every 12 months to get the raise.

You might be interested in
_____ is a predefined format used for text the can include multiple font formatting features
seraphim [82]
The correct answer is



style
8 0
3 years ago
In UML behavioral modeling, a message is _____. (Points : 6) a named location in memory where information is deposited and retri
rusak2 [61]

Answer: a function or procedure call from one object to another object

Explanation: UML(Unified Modeling language) behavioral modeling is the depiction of the relation of the elements in a dynamic manner and the dependency on time .Message in the UML behavioral modeling is a functional call taking place from one element to another.

The interaction is the model is seen through the flow of messages.Other options are incorrect because message is not information holding data structure, does not display the relation between object rather presents the flow and is not a memory location .

7 0
3 years ago
What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's dev
Mamont248 [21]

Answer: A. CRYPTO-MALWARE

Explanation: Crypto-malware is a type of ransomware that blocks the uses from accessing the computer system,it also encripts all the files.

This type of ransomware is mainly used to demand for ransom.

This type of ransomware which makes use of sophisticated and advanced ransomware technology to ensure that encripting must be with a unique Key or password,the hijacked system is used for crypto mining without the owns consent.

7 0
3 years ago
Read 2 more answers
The activity spikes during black Friday sales in the holiday season but significant stress on a major retailers website what fea
Elza [17]

Answer:

My Nav is the right answer.

Explanation:

Net asset value (NAV) describes a fund's per part exchange value. NAV is calculated by separating the complete value of all the money and securities in a fund's responsibility, minus any mortgages, by the number of exceptional shares. The NAV estimation is necessary because it shows us how much one portion of the fund is worth.

4 0
3 years ago
In a digital computer system, the data is transferred between the CPU and the other components
FinnZ [79.3K]

Answer:

The data transmission or information exchange from the CPU to either the computer's peripherals is accomplished via "Computer ports". The further explanation is given below.

Explanation:

To link a display, camera, microphones, or other devices, computer ports have several purposes. The Processor (CPU) also interacts through a bus to peripherals. Several categories of buses you must have got to hear of would be universal servo controller, PCI, or Compulsive-ATA.

  • A peripheral device has always been defined as any auxiliary appliance including a mouse as well as a keyboard, which somehow helps connect to either the PC but instead operates with it.
  • Computer systems were composed of various hardware. This would include the CPU, storage, buses, devices, etc.

So that the above is the right answer to the given scenario.

8 0
3 years ago
Other questions:
  • Which inserted element in an email message displays a graphic from a data source
    15·2 answers
  • Lucy is completing a project as part of a science class using materials she found online. Which of the following is MOST LIKELY
    5·1 answer
  • This is for pepole to make friends
    7·2 answers
  • Www.microsoft.com is an example of this (two words) (last letter is e) and has to be (10 letters)
    10·1 answer
  • A/an<br> controls the flow of data between a computer and the network.
    8·1 answer
  • Hey you know Python? Could you help me, please? It's for my Final please help me SOS.
    8·1 answer
  • Design and implement an application that reads a set of values in the range 1 to 100 from the user and then creates a chart show
    8·1 answer
  • Chris is working with other employees on a worksheet. The other employees have made comments, but they are not visible.
    11·1 answer
  • The probability of event A occurring is 10/10. The probability of event B occurring is 0/10. What is the entropy of this system?
    15·1 answer
  • What are the dominant InfoSec-related credentials used to document knowledge and/or experience?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!