1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gladu [14]
3 years ago
12

Java code?????

Computers and Technology
1 answer:
12345 [234]3 years ago
5 0

Answer:

Explanation:

Here is the code for you:

import java.io.*;

import java.util.*;

class GirlScoutCookies

{

public static void main(String[] args)

{

int [] BoxesCategory = new int[5];

Scanner sc = new Scanner(System.in);

System.out.print("Total number of girls in the troop: ");

int numOfGirlScouts = sc.nextInt();

for(int i = 0; i < numOfGirlScouts; i++)

{

System.out.print("Boxes of cookies for girl #"+(i+1)+": ");

int boxes = sc.nextInt();

if(boxes >= 0 && boxes <= 10)

BoxesCategory[0]++;

else if(boxes >= 11 && boxes <= 20)

BoxesCategory[1]++;

else if(boxes >= 21 && boxes <= 30)

BoxesCategory[2]++;

else if(boxes >= 31 && boxes <= 40)

BoxesCategory[3]++;

else if(boxes > 40)

BoxesCategory[4]++;

}

System.out.println("TOTAL BOXES\tNUMBER OF GIRL SCOUTS");

System.out.println(" 0 to 10\t"+BoxesCategory[0]);

System.out.println("11 to 20\t"+BoxesCategory[1]);

System.out.println("21 to 30\t"+BoxesCategory[2]);

System.out.println("31 to 40\t"+BoxesCategory[3]);

System.out.println("41 or more\t"+BoxesCategory[4]);

}

}

And the sample output is:

You might be interested in
You need to access the registry on your windows 10 computer how do you do this
Nikitich [7]

Press the Win and R keys together and the Run dialog box will pop up. Type regedit in the dialog box and you will then have access to the registry.

8 0
3 years ago
Where would the information needed to start a computer be stored
Ipatiy [6.2K]

Answer:

the ROM chip

Explanation:

the ROM chip is installed on the motherboard which helps boot the system

6 0
3 years ago
Richman Investments is an investment and consulting firm. Richman wants to expand its business operations both in the U.S. and i
Alika [10]

Answer:

All these can be done using PKI.

Explanation:

PKI or the private key infrastructure is a new way to encrypt the data transfer or the retrieval along with the network among various terminals. The communication can be single node, hierarchical, bridge, mesh and hybrid. In the case of mesh, the connection can be established between each terminal. However, the connection can be established in between each pair via a network which can be a private network or it can be via the internet. However, the channel is required to be encrypted, or else the data can be hacked and attacks like a man in the middle attacks are quite on cards certainly. And this can be done using the PKI, which can be installed using the Certificate Authority and Public-private key pair generator. Suppose a connection is to be established between each node. And for this, you need to generate the certificate, which is generated by the Certificate Authority. And this is generally a third party like Godaddy, Verisign, etc. You can make use of the CSFFL as well. The free certificate authority Let’s Encrypt makes use of the CSFFL. And you must be using a web server as well like Apache that comes with services like OpenSSL that can be used to generate the certificate, and you can have your root Certificate Authority. That issues the certificate to the issuing certificate authority and the issuing certificate authority after registration confirmation by a person or a Robot, issues the certificate to the node which is requesting access to another node. And this certificate has the personal details of the requesting node and information about the webserver or node to which the requesting node is opting for a secure connection. The Certificate, when received by the webserver, is then matched with the certificate copy kept at the Root Certificate Authority. These days we also have the certificate revocation authority and Google has come up with Certificate transparency. So we can build our certificate authority, or we can have online certificate authority. These certificates also have the digital signature, which can be decrypted via the private key that is kept with the sender. The public key is sent to the certificate authority, and it decrypts it with the public key. And certificates are distributed among various types of trusts, which can be single, hierarchical, bridge, mesh and hybrid.  And for each application, we have different certificates. Thus issues like non-repudiation, check over unauthorized access, restrict access to the resources, etc, can be ensured with the help of the PKI. And thus, we can secure the whole network at various levels like application level, transport-level, etc. Also, the company network can be bridged with the client or the business partner company if required using bridge level trust. However, we can also have a hierarchical level of trust. And thus we can secure the network using PKI and also confirm all the issues mentioned in the question are resolved. However, certificates are also being generated by Windows server 2012, and we can make use of it as well.

5 0
3 years ago
Where to set up wireless network xbox one?
svlad2 [7]
Turn on your Xbox One and go to the Settings menu.

Select Network.

Select Set Up wireless network, to connect to a new network.

Xbox One asks Which one is yours? and displays the wireless networks it detects in your area.

Select the network you want to connect to.

4 0
3 years ago
When you boot up a computer and hear a single beep, but the screen is blank, what can you assume is the source of the problem?
olchik [2.2K]
Either your screen isnt plugged in and synced properly or you have a problem in the automatic boot system 
5 0
3 years ago
Read 2 more answers
Other questions:
  • Which key removes all data from an active cell with one click
    7·2 answers
  • Mike wants to build an amplifier. Which technology can he use?
    15·1 answer
  • During the past decade ocean levels have been rising faster than in the past, an average of approximately 3.1 millimeters per ye
    14·1 answer
  • The color band that represents tolerance on a resistor is the?
    11·1 answer
  • An example of software most commonly associated with productivity software is ____.
    12·1 answer
  • What component of Kerberos is responsible for storing keys for encrypting and decrypting data in the authentication process?
    13·1 answer
  • Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port
    12·1 answer
  • Jeremy wishes to create a site map for his website. What tag will surround the URL of his home page?
    9·1 answer
  • Assume there are two variables, k and m, each already associated with a positive integer value and further assume that k's value
    13·1 answer
  • Please help ASAP! will mark brianliest! 30 points!
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!