1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
densk [106]
3 years ago
15

What output is produced by the following code? Integer first = new Integer(7); Integer second = first; if (first == second) Syst

em.out.println("Sneezy"); else System.out.println("Grumpy"); if (first.equals(second)) System.out.println("Sleepy"); else System.out.println("Doc"); Sneezy Sleepy Sneezy Doc Grumpy Sleepy Grumpy Doc
Computers and Technology
1 answer:
fenix001 [56]3 years ago
6 0

Answer:

The correct output of this question is  "Sneezy Sleepy".

Explanation:

In the given code firstly we create the object of the integer class that is first in this we pass the integer value that is 7. Then we declare another second integer variable is this variable we pass object as a reference. Then we use the two conditional statements. In the first, if block we check that the object of the class is equal to the reference variable. If it is true it prints Sneezy. otherwise, it will print Grumpy. In second if block we check that the object of the class is equal to the reference variable. but in this time we the equals() function it is the same as(==). If the condition is true it prints Sleepy. otherwise, it will print Doc. So the output of the code is Sneezy Sleepy.

You might be interested in
A nonprofit organization uses a contact management database to track donations, amounts donated, and all correspondence and phon
notka56 [123]

Answer:

nvbvbnvvbnbnvbnvbn

Explanation:

vbnvbnvbnbnnnbvnn

7 0
3 years ago
3. You are a network administrator responsible for all network platforms and services. The Teta Company currently has only one b
solniwko [45]

Answer:

1. Wired networks may give the appearance of a busy office full of the latest equipment, but in reality, wires can be an inefficient networking medium. They can limit signal strength as well as make it more difficult to expand and reorganize your network configuration.  Wireless networking is a viable and affordable alternative that offers the benefits of making your environment more flexible. A wireless infrastructure allows you to effortlessly reconfigure your office space as your company grows and changes, easily extend connectivity and also allows employees to be mobile more easily.

2. Review the advantages and consider the benefits to your organization:

Reduced cost of installation. It may be significantly less expensive to install wireless access points compared to wiring your office with Ethernet capabilities.

Flexibility. If you regularly expand or reorganize your office space, or need to accommodate a variety of network configurations, the rapid transition time from one configuration to another that wireless provides can help reduce your network downtime. In addition, you won't have to incur the costs associated with physically rewiring office space.

Convenient information access. With wireless, you'd have the ability to extend access to key information to anyone on your staff, from anywhere in the office, even when they aren't physically connected to your wired local area network (LAN) connection. Do members of your staff regularly work away from their desks or stations, but could benefit from anytime, anywhere access to important data? Could you improve productivity by increasing access to important company systems? Do you have business processes you could streamline by reducing the number of times employees have to go back to their wired connections?  Wireless LANs are the way to go, especially where there's no existing wired network. This is especially true in leased offices, where you can't go knocking holes in walls.

Your next step is to actually build a wireless LAN, which you'll do just like this:

Identify the equipment you want to buy, such as wireless notebooks, access points, wireless LAN adapters and wireless cards.

Determine the number of users who need to have access to the network. This will help you determine the number of access points you'll need.

Plan for the connection to your wired LAN, probably in a central location and in an open environment. Your goal is to maximize the access point's wireless range. The quoted range is a maximum of 300 feet, but that's very dependent on the existing environment--walls, water pipes, cables and so on all could decrease the range. The best thing to do is complete a site survey first; if that's not possible, assume a maximum range of 150 feet, as 300 could decrease throughput.

8 0
3 years ago
Read 2 more answers
Identify when programmers use an Else statement.
Gnesinka [82]

Answer:

to tell the program to take a different action when the If statement answer is false

Explanation:

if x = 0:

     print('x equals 0')

else:

      print('x equals something else that isnt 0')

4 0
3 years ago
Read 2 more answers
What is a primary risk to the Workstation Domain, the Local Area Network (LAN) Domain, and the System/Application Domain
eimsori [14]

It should be noted that a primary risk to the Workstation Domain is the absence of a firewall and unauthorized access to the workstation.

<h3>What is a workstation domain?</h3>

The Workstation Domain simply means an individual user's computer where his or her work takes place. It should be noted that computers operating systems have vulnerability which can be susceptible to hackers.

A primary risk to the Workstation Domain is the absence of a firewall and unauthorized access to the workstation.

Learn more about workstation on:

brainly.com/question/26097779

8 0
3 years ago
Which of the following devices are least likely to deny a connection inline when an attack is detected? (select 2)
user100 [1]

Answer: Option (A) & (D) are correct.

Layer 2 switch is commonly referred to as a type of network or device switch that tends to work on data link layer and use MAC addresses in order to determine the route through which the frames are forwarded.

An IDS known as intrusion detection system is commonly referred to as a device or application that controls a network for malevolent activity and its policy violations.

7 0
3 years ago
Other questions:
  • A(n ____ with a drop down menu provides consistency in function and appearance making it easy for users to learn and work with t
    7·1 answer
  • Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa
    5·1 answer
  • 0001 0000 1100 0011 (unsigned, that is, interpreted as b2u)i.8 bit truncated value:ii.does the value change when truncated to 8
    7·1 answer
  • Rint "Censored" if userInput contains the word "darn", else print userInput. End with newline.
    11·1 answer
  • A system administrator is selecting an operating system for use by the company’s research and development team. The team require
    15·1 answer
  • In an URL what does the domain name describe?
    14·1 answer
  • Will give brainly if answer all or my questions
    8·1 answer
  • Do you think JNK should be more ethical?
    6·1 answer
  • Anyone want to play mine mincraft w/ me?
    9·1 answer
  • How much weight does a headgear need to carry
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!