Answer:
1/2000
Explanation:
import java.util.Scanner;
public class InputExample {
public static void main(String [] args) {
Scanner scnr = new Scanner(System.in);
System.out.print("Enter birth month and date:");//comment this line if not needed
int birthMonth=scnr.nextInt();
int birthYear=scnr.nextInt();
String output= birthMonth+"/"+birthYear+"\n";
System.out.println(output);
}
}
if using this code the out put should be 1/2000
Answer:
int[ ][ ] X = new int[5][5];
It can also be declared and initialized this way:
int[][] X = {
{1,2,3,6,8},
{4, 5, 6, 9},
{7,5,6,8,9},
{8,5,8,8,9},
{10,2,6,8,11},
};
Explanation:
Above is a declaration of a two-dimensional array that can hold 5*5=25 int values. A java program is given below:
public class JavaTwoD{
public static void main(String args[ ]) {
// creating the 5X5 array
int[ ][ ] X = new int[5][5];
// looping through the array to add elements
for (int i = 0; i < X.length; i++) {
for (int j = 0; j < X[i].length; j++) {
X[i][j] = i * j;
}
}
Answer:
answer is 8! / (4! * 4!). Which gives a value of 70.
Explanation:
we have 8 places, we’re going to pick 4 places to put the zeros, it is 8! / (4! x 4!)
Answer:
A. Helps prevent a system from being fingerprinted by port scans.
B. Can restrict a computer from receiving network traffic.
D. Stop a process or application from launching.
Explanation:
The "host-based firewall" is an important type of<em> firewall software </em>that is being installed into a computer/device in order to allow it to control the network traffic. This enables the host to protect itself from any malware or viruses that may attack. It, primarily, provides a customized protection. Thus, it is more commonly used by <em>small businesses</em> or<em> individual people</em>.
Host-based firewalls allows "packet filtering." This controls the network access which makes it hard for attackers because of the little information that it provides. So, this explains option A. This then prevents a system from being fingerprinted by port scans.
Host-based firewalls can protect the device from unwanted network traffic, so this explains option B. This then restricts the computer from receiving the network traffic.
It can disable programs that are malicious, thereby stopping the launching of those programs. This explains option D.