1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vichka [17]
3 years ago
11

Write multiple if statements: If carYear is before 1967, print "Probably has few safety features." (without quotes). If after 19

71, print "Probably has head rests.". If after 1992, print "Probably has anti-lock brakes.". If after 2002, print "Probably has tire-pressure monitor.". End each phrase with period and newline. Ex: carYear = 1995 prints: Probably has head rests. Probably has anti-lock brakes.
Computers and Technology
1 answer:
Liono4ka [1.6K]3 years ago
5 0

Answer:

public class Main

{

public static void main(String[] args) {

    int carYear = 1995;

   

    if(carYear < 1967)

        System.out.println("Probably has few safety features.");

    if(carYear > 1971)

        System.out.println("Probably has head rests.");

    if(carYear > 1992)

        System.out.println("Probably has anti-lock brakes.");

    if(carYear > 2002)

        System.out.println("Probably has tire-pressure monitor.");

   

}

}

Explanation:

The code is in Java.

Initialize the carYear

Use if statements to handle year before 1967, after 1971, after 1992 and after 2002.

Print the required message for each if statement

You might be interested in
For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also pro
elena-14-01-66 [18.8K]

Answer:

1. Option (a) is the correct answer. "Place a firewall between the Internet  and your Web server".

2.  Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".

3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".

4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".

5. Option (c) is the correct answer. "Enforce password complexity".

Explanation:

1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.

2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.

3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.

4.All personnel will be taught the network policies  to avoid sending report to unsecured printers.

5.  The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.

8 0
3 years ago
Clusters always occur in multiples of what? <br> A.)10 <br> B.)5<br> C.)2 <br> D.)100
kotykmax [81]
I would say ten would be the answer
8 0
3 years ago
Read 2 more answers
How does a light bulb work
koban [17]
A light bulb is usually powered by a wire producing electricity. The energy can also come from wind turbines or solar panels.

Hope this helps
7 0
4 years ago
Read 2 more answers
A circuit contains three resistors connected in parallel. The value of R1 is 2 K , the value or R2 is 6 K , and the value of R3
mezya [45]
In a parallel connection, the voltage is same in every branch.
Now, three <span>three resistors connected in parallel.
R1 = 2k ohm
</span>R2 = 6k ohm
R3 = 10k ohm
in parallel, net resisitance  = \frac{ R_{1}R_{2}R_{3} }{R_{1}R_{2} + R_{2}R_{3} + R_{3}R_{1}}

Now, putting the values, we get, R net = 1.30 k ohm.
Ans, voltage = 100 VDC
Thus, power = \frac{ V^{2} }{R} = \frac{ 100^{2} }{1.3 k} \\ \\ where \\ k = 10^{3} 
                      = 7.69 Watt
6 0
3 years ago
Which was the first console with a programmable microprocessor and a ROM chip?
Mazyrski [523]
I believe it was Nintendo hope this helps 
5 0
3 years ago
Read 2 more answers
Other questions:
  • ________ are viruses that masquerade as useful programs or files. hydras spyware programs worms adware programs trojan horses
    6·1 answer
  • True/False: If a function is legally prototyped to return an integer value, it can return a structure member that is an integer
    11·1 answer
  • What are the two basic steps in communication
    9·1 answer
  • How do you create a reference page in apa format with all websites?
    5·1 answer
  • Which branch of science helps avoid or minimize stress-related injuries at workplace?
    12·2 answers
  • Can someone explain to me how to do circuit calculations
    11·1 answer
  • Cloud computing allows organizations to rent computing resources from providers instead of having their own locally managed ____
    7·1 answer
  • Why are object-oriented languages very popular?
    11·2 answers
  • Write a program that will add up the series of numbers: 99, 98, 97… 3, 2, 1. The program should print the running total as well
    13·1 answer
  • What refers to a set of instructions executed in order?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!