1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katen [24]
3 years ago
10

Imagine you are writing a personal fitness program that stores the user's age, gender, height (in feet or meters), and weight (t

o the nearest pound or kilogram). Declare variables with the appropriate names and types to hold this information. Write a complete variable declaration statement with the type, the variable name, and a semicolon.
Computers and Technology
1 answer:
nata0808 [166]3 years ago
5 0

Answer:

Following are the declaration with the datatypes

int age; // variable age of int types

boolean gender; // variable gender of boolean type

double height; // variable height of double types

int weight; // variable weight of int types

Explanation:

Here we writing a personal program that store the age,gender,height,weight.

age of type integer because age are in integer value.

gender is type of boolean because boolean is return true or false .

height is type of double because height may be in floating value.

weight is type of integer because weight are in integer value.

You might be interested in
Sonora wants to extend the cells to be added in her formula. What is the quickest way to add more cells?
djyliett [7]

Answer:

D

Explanation: took the test on edge

7 0
3 years ago
Read 2 more answers
A polyalphabetic cipher uses many ___
Greeley [361]

Answer:d) Mono-alphabetic substitution rules

Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.

Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.

3 0
3 years ago
Bob works in a small office with a network of computers. Bob, along with all the other employees, is responsible for securing hi
miskamm [114]

Answer:

False

Explanation:

When an employee becomes the one responsible for the security of His own computer then the scenario does not define Network security. Network security is a usage of hardware and related software to provide protection to the underlying network architecture from unauthorized access and other anomalies related to networks.

5 0
3 years ago
Which of the following code displays the area of a circle if the radius is positive? Question 4 options: if (radius <= 0) Sys
Marina CMI [18]

Answer:

(d) if (radius > 0) System.out.println(radius * radius * 3.14159);

Explanation:

Given

Code segment (a) to (d)

Required

Which is correct

Code segment (a): radius <=0

This means that radius is 0 or less, i.e. 0 or negative

Code segment (b): radius !=0

This means that radius is not equal to 0 i.e. it could be positive or negative but definitely not 0

Code segment (c): radius >=0

This means that radius is 0 or greater, i.e. 0 or positive

Code segment (d): radius >0

This means that radius is  greater than 0 i.e. positive

<em>Hence, (d) is correct</em>

3 0
3 years ago
Does kohl's sell homecoming dresses?? And if do you know what the price rage would be !!
SpyIntel [72]

Answer:

Yes, the prices are anywhere from $30-$100 dollars+tax

https://www.kohls.com/catalog/juniors-homecoming-dresses-clothing.jsp?CN=Gender:Juniors+Occasion:Homecoming+Category:Dresses+Department:Clothing

6 0
3 years ago
Other questions:
  • Digital art is created by using
    6·1 answer
  • On computer X, a nonpipelined instruction execution would require 12 ns. A pipelined implementation uses 6 equal-length stages o
    9·1 answer
  • With respect to computer networks, organizations often install a dedicated telephone system called a ________ to route external
    8·1 answer
  • The list method reverse reverses the elements in the list. Define a function named reverse that reverses the elements in its lis
    10·1 answer
  • What types of printed information are useful to obtain from your target employers?
    5·1 answer
  • The purpose of __________________ is to isolate the behavior of a given component of software. It is an excellent tool for softw
    13·1 answer
  • Sam’s password is known to be formed of 3 decimal digits (0-9) in a given order. Karren and Larry are attempting to determine Sa
    9·2 answers
  • What is the difference between EPROM and EEPROM, explain why​
    11·1 answer
  • What are the benefits of a relationship in RDBMS <br>​
    14·1 answer
  • Glenda is searching airline schedules on HolApp, a mobile Web application. While browsing the application, a banner appears on t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!