1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRissso [65]
3 years ago
9

Suppose your name was George Gershwin. Write a complete main method that would print your last name, followed by a comma, follow

ed by a space and your first name.
Computers and Technology
1 answer:
12345 [234]3 years ago
4 0

Answer:

Following is the program in Java Language

public class Main // main class

{

public static void main(String[] args) // main method

{

System.out.println( "Gershwin, George" ); // display value

}

}

Output:

Gershwin, George

Explanation:

Following is the description of Statement:

  • In this, we using the System.out.println() to print the value in the console window. The System.out.println() is used in java is used to print the data in the console.
  • In this, we pass the "Gershwin ,George" string in the double quotes along with a comma between them.

You might be interested in
How do i switch my level to high school on brainly
Bumek [7]

Edit your profile, click preferences, and then there should be a drop down that has your level on it which you can change.

7 0
3 years ago
Read 2 more answers
Where should citations be included in your research paper? Select all that apply.
yKpoI14uk [10]

Answer:

it would be the first one because it's the header and that's what applies

5 0
3 years ago
Explain the RISC and CISC architecture. Comparison of RISC and CISC in detail.
puteri [66]

Answer:RISC(reduced instruction set computer) is the computer used for low level operation by simple command splited into numerous instructions in single clock only and CISC(Complex instruction set computer) is the computer that performs the operation in single instruction.

RISC architecture has hardwired control unit,data cache unit,data path ,instruction cache and main memory as components .CISC architecture persist of  control unit,micro program control memory, cache, instruction and data path and main memory.

The differences between RISC and CISC are as follows:-

  • The instruction in RISC are less and and low complexes while CISC has several number of complex instruction.
  • The calculation done by RISC are precise and quick whereas CISC has slightly slow calculation processing.
  • The execution of RISC is faster as compared to CISC.
  • RISC uses hardware component for implementation of instruction because it does not persist its own memory and CISC implements instructions using its own memory unit .

6 0
3 years ago
How do you change your username in this app
Alekssandra [29.7K]
You cant, if you want to change you can create another account :)
6 0
3 years ago
Read 2 more answers
A salesman has been traveling to different businesses all day to give a sales presentation. Each time, he was starts up his lapt
Naddik [55]

Answer:

A. Corrupted or missing display driver

Explanation:

The most likely reason for this problem would be a corrupted or missing display driver. The display driver is in charge of grabbing the information from the graphic card and adjusting all the necessary settings so that all of the graphic card's power is able to be utilized. Missing or corrupt drivers can cause errors such as laggy display, wrong resolution/minimum resolution, missing display settings, etc. A graphic card failure on the other hand would show no image on the screen whatsoever when turning on the computer.

8 0
3 years ago
Other questions:
  • You send a report to your boss for feedback and she returns it to you with her edits noted in the electronic file. This Word fea
    14·2 answers
  • You can encrypt individual files, but microsoft recommends encrypting at what level?
    9·1 answer
  • "Suppose that instead of always selecting the first activity to finish, we instead select the last activity to start that is com
    14·1 answer
  • 3-d metal printing, artificial intelligence, and self-driving cars are examples of ___________.
    10·2 answers
  • Which of the following is a way the operating system prevents unknown or unauthorized users from accessing the system?
    15·2 answers
  • What is the local portion of the e-mail address below? <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="
    15·1 answer
  • To move an icon, you right-click it and select “Pin to start menu.” True False
    5·2 answers
  • A user tells a help desk technician that their browser is displaying a message that a site can't be
    14·1 answer
  • The physical layer of the OSI model is not foundational to any of the other layers. True or False
    8·1 answer
  • During prereading, it is not important to pay attention to visual aids. please select the best answer from the choices provided
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!