1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notka56 [123]
3 years ago
14

Write a program whose input is two integers. Output the first integer and subsequent increments of 10 as long as the value is le

ss than or equal to the second integer.
Computers and Technology
1 answer:
Lubov Fominskaja [6]3 years ago
3 0

Answer:

import java.util.Scanner;

public class TestClock {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter two integer numbers");

       int num1 = in.nextInt();

       int num2 = in.nextInt();

       int newSum=num1+10;

       System.out.println("The first number is "+num1);

       do{

          System.out.println(newSum);

          newSum +=10;

       }while (newSum <=num2);

   }

}

Explanation:

Using Java Programming language

  1. Prompt user for the two inputs and save them as num1 and num2(Using the scanner class)
  2. Create a new Variable newSum = num1+10
  3. Create a do...while loop to continually print the value of newSum, and increment it by 10 while it is less or equal to num2
You might be interested in
You can use view the ______ file to view the hard drive details.
Anastaziya [24]

Answer:

/proc/partitions

5 0
3 years ago
A general-use dimmer switch is required to be counted as ? where installed in a single-gang box on a circuit wired with 12 awg c
aleksandrvk [35]

Answer:

2 conductors.

Explanation:

A dimmer switch is an electrical switching or control device used to control the power or voltage to a compatible dimmer bulb.

It reduces the ambience if light bulbs by uniformly increasing the resistance of the switch when the knob is rotated to a lesser point. It is a circuit breaker as two conductors are connected to its terminals and a variable voltage resistor determines the flow of current between them.

3 0
4 years ago
Match each item with a statement below. a.Authentication b.Brute force attack c.Dictionary attack d.Password e.Shoulder surfing
Lana71 [14]

The steps that ensure that the individual is who he or she claims to be

a. Authentication  

Authentication is a process that provides proof that the user is genuine and not an imposter. It is a way to prove that you are allowed to access a system. Usernames and Passwords have been the default method of authentication. These days though, passwords are not the only authentication mechanism.

A password attack in which every possible combination of letters, numbers, and characters is used to match passwords in a stolen password file

b. Brute force attack  

An automated brute force attack involves repetitive successive attempts of password guesses by using a trial and error approach and hoping to guess the encryption correctly. It is an old attack method, but is still in effect and popular with hackers. It can take minutes to crack or an eternity. Using automated brute force attacks tools and programs, and attacker is able to enter parameters such as password length, character set, pattern, language, and skips for the type of password to be generated

A password attack that compares common dictionary words against those in a stolen password file.

c. Dictionary attack  

A dictionary attack is another common offline password attack that begins with the attacker creating encrypted versions of common dictionary words and then compares these words against those in a stolen password file. This is sometimes very successful because users create passwords that are simple English dictionary words. A variation of such an attack is the hybrid attack.

A secret combination of letters, numbers, and/or symbols that serves to authenticate a user by what he or she knows.

d. Password  

Nowadays, when accessing almost any computer device, systems, or a website, we are typically required to provide information that identifies and proves that we are actually that person. This is done by the use of passwords. Despite passwords being the primary means of authentication, they are no longer considered to be a strong defense against attackers.

Viewing information that is entered by another person

e. Shoulder surfing  

An example of shoulder surfing is observing someone entering a code from a keypad while standing from a short distance. Another good example is a hotel room’s cipher lock. Cipher locks are vulnerable to shoulder surfing. Someone passing by from behind is able to see the buttons being pushed and can easily gain access when you leave.

Grouping individuals and organizations into clusters based on an affiliation  

f. Social networking and not social engineering

The definition above is for social networking and not social engineering. Social networking sites are responsible for facilitating individuals with common interests and beliefs and operates and functions as an online community of users. Anyone on social media is able to read information posted by others. Thus, social networking carries with it cyber risks like personal data being used maliciously.

Redirecting a user to a fictitious website based on a misspelling of the URL  

g. Typo squatting

Also known as URL hijacking, Typosquatting is a questionable type of cybersquatting that targets internet users who type a web address incorrectly. It is the extreme version and similar to phishing. When users make such errors, they may be lead to another alternative site owned by a hacker.

Phishing attack in which the attacker calls the victim on the telephone

h. Vishing  

Instead of using emails or other forms of communication to contact the potential victim, a simple phone call can be used. Known as voice phishing, an attacker calls an unsuspecting victim and pretends to be someone working with the victim’s bank. The attacker lies to the user that his or her credit card has experienced fraudulent activity, instructs the victim to call a specific number and hangs up. Upon calling back, the victim is instructed by automated instructions telling them to enter credit card numbers and other essential details.

A phishing attack that targets wealthy individuals  

i. Whaling

Whaling is a type of spear phishing where instead of targeting the small fish, it targets the “bigger fish” or the wealthy individuals who have larger sums of money in a bank account. By putting every effort on this group, the attacker can invest more time in the attack and achieve major success.

6 0
3 years ago
Please explain in simple words. What does a root do to your tablet? And how do you do it? Is it worth doing it if you only play
nadya68 [22]
Root is a term for android devices similar to "jailbreak" for Apple devices. Rooting gives you basically full control of your device but is considered to be a third party software because you are modifying the operating system. I would watch a YouTube video on how to root your device. I tried to root my device so I could get this screen recording app to work. I think it is really up to you because I think it avoids warranty.
6 0
3 years ago
Type the correct answer in the box. Spell all words correctly. Define the term semiconductor. A semiconductor is a material that
Katena32 [7]

Answer:

conductor

A semiconductor is a material that can carry an electric current between a conductor and an insulator.

4 0
3 years ago
Other questions:
  • Which of the following is NOT a recommended characteristic for incident objectives?A. Stated in broad terms to allow for flexibi
    6·1 answer
  • Review the section from your textbook related to management information systems (MIS) infrastructures. Determine where each item
    13·1 answer
  • What are some common security threats for our home devices and IoTs?
    14·1 answer
  • There are n coins, each showing either heads or tails. We would like all the coins to show the same face. What is the minimum nu
    6·1 answer
  • What is the best game of 2020 in pc​
    12·2 answers
  • Suppose L is a LIST and p, q, and r are positions. As a function of n, the length of list L, determine how many times the functi
    8·1 answer
  • Robert gets home from school at 3 p.M. His mom has to leave for her shift at work at 3:15 and she wants him to watch his baby br
    9·1 answer
  • Which of the following describes an executive information system (EIS)?
    11·1 answer
  • Carly’s Catering provides meals for parties and special events. Write a program that prompts the user for the number of guests a
    10·1 answer
  • LAB: Winning team (classes)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!