1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
3 years ago
9

Please check my answers! (Java)

Computers and Technology
1 answer:
KatRina [158]3 years ago
4 0

I think only II contains an error.

Tricky because, syntactically, all three are correct I.M.O.

However, if the goal is to iterate as many times as lotNumLength, then statement II loops one time too many. This is known as an off-by-one error.

You might be interested in
What features are offered by most of the email programs with for receiving and sending messages?
Varvara68 [4.7K]

Answer:

The main features of email is, (1) Attachment :Ability to attach the files along the messages is one of most useful features of email. (2)Address book: It is also most important features of email that allows a user to storing the information.

Explanation:

3 0
3 years ago
Which of the following is not a language commonly used for web programming?
DerKrebs [107]
The answer would be Assembly language as assembly language is not used for web development, but rather is a low level programming language.

Please mark branliest if this helped!!
7 0
3 years ago
Read 2 more answers
What is the oldest malware victor
arsen [322]

Answer:

The oldest malware vector was emails.

Explanation:

Websites were not widespread early on into the internet, however it was very easy to have a virus that uses an email contact list, where it can send itself to other email addresses and spread.

7 0
3 years ago
Is the ipv6 address 2001:1d5::30a::1 a valid address? why or why not?
defon
<span>Not a valid IPv6 address A valid IPv6 address consist of 8 groups of 4 hexadecimal numbers separated by colons ":". But that can make for a rather long address of 39 characters. So you're allowed to abbreviate an IPv6 address by getting rid of superfluous zeros. The superfluous zeros are leading zeros in each group of 4 digits, but you have to leave at least one digit in each group. The final elimination of 1 or more groups of all zeros is to use a double colon "::" to replace one or more groups of all zeros. But you can only do that once. Otherwise, it results in an ambiguous IP address. For the example of 2001:1d5::30a::1, there are two such omissions, meaning that the address can be any of 2001:1d5:0:30a:0:0:0:1 2001:1d5:0:0:30a:0:0:1 2001:1d5:0:0:0:30a:0:1 And since you can't determine which it is, it's not a valid IP address.</span>
6 0
3 years ago
A favorite pastime of information security professionals is ____, which is a simulation of attack and defense activities using r
GenaCL600 [577]

Answer:

war gaming

Explanation:

Wargaming in hacking is a cyber security challenge where competitors must exploit or defend a loophole/vulnerability in a system or application or gain or prevent access to a particular computer system, it is in a form of competition but it really helps them in securing systems/application when it arises.

5 0
3 years ago
Other questions:
  • When you make a pointer variable im C++, is star label a must?
    9·1 answer
  • You often insert your company's logo into documents you create. One way to make it easier for you to quickly insert it is to sav
    10·1 answer
  • One page of content in a PowerPoint presentation is referred to as a
    12·1 answer
  • When microsoft introduced its zune mp3 player, many people thought it would capture the mp3 player market by pricing its product
    8·1 answer
  • My sister put my phone in the microwave and I'm pretty sure the battery blew up. I'm too scared to open the microwave. What do I
    11·1 answer
  • A range check that can be used in Microsoft access to calculate the data collected which is date and time
    10·1 answer
  • Can someone help me so I don’t fail this class:(
    14·1 answer
  • Write a program with a "function" named "getMinFromInput()" that reads a list of integers from the keyboard and returns the smal
    5·1 answer
  • In 1868 the qwerty keyboard was patented by this man
    5·1 answer
  • Write a loop that continually asks the user what pets the user has until the user enters rock in which case the loop ends. It sh
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!