1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melamori03 [73]
3 years ago
12

Given that the variable named Boy = "Joey" and the variable named Age = 6, create statements that will output the following mess

age:
Congratulations, Joey! Today you are 6 years old.

First, write one statement that will use a variable named Message to store the message. (You will need to concatenate all of the strings and variables together into the one variable named Message. If you don't know what that means, read the section in Chapter 1 about concatenation.)
Then write a second statement that will simply output the Message variable.
Computers and Technology
1 answer:
stepan [7]3 years ago
5 0

Answer:

isn't it already showing it if not put text box

Explanation:

You might be interested in
DMA controllers ____.A) do not utilize an additional, special purpose, processorB) are a nonstandard component in PCs of todayC)
otez555 [7]

Answer:

D) can access main memory at the same time as the main CPU

Explanation:

DMA is short for Direct Memory Access, these controllers allow the device to transfer data directly to and from the memory modules without interfering with CPU processes. Therefore it can access main memory at the same time as the main CPU. Thus freeing up CPU processing power for other tasks while also retrieving the data necessary.

8 0
2 years ago
When you connect to an Access database, which entities are shown in the Navigator window?
Leni [432]

1DFASDFAASDASDFASDFADSFASFD

4 0
2 years ago
Read 2 more answers
4.2.3: Basic while loop expression. Write a while loop that prints userNum divided by 2 (integer division) until reaching 1. Fol
wlad13 [49]

Answer:

import java.io.*;

import java.util.Scanner;

class divide {

public static void main (String[] args) {

    Scanner num=new Scanner(System.in);//scanner object.

    int userNum=num.nextInt();

    while(userNum>1)//while loop.

    {

        userNum/=2;//dividing the userNum.

        System.out.print(userNum+" ");//printing the userNum.

    }

}

}

Input:-

40

Output:-

20 10 5 2 1

Input:-

2

Output:-

1

Input:-

0

Output:-

No Output

Input:-

-1

Output:-

No Output.

Explanation:

In the program While loop is used.In the while loop it divides the userNum by 2 in each iteration and prints the value of userNum.The inputs and corresponding outputs are written in the answer.

4 0
2 years ago
Read 2 more answers
A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
MakcuM [25]

A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment

Two factors may interfere with the copper cabling and result in signal distortion and data corruption are :

EMI

RFI

Explanation:

  • EMI (electromagnetic interference) is the disruption of operation of an electronic device when it is in the vicinity of an electromagnetic field (EM field) in the radio frequency (RF) spectrum that is caused by another electronic device.
  • During EMC testing, radiated emissions measurements are made using a spectrum analyzer and or an EMI receiver and a suitable measuring antenna.
  • EMI (Electromagnetic Interference) is also called RFI (Radio Frequency Interference).
  • Conducted RFI is unwanted high frequencies that ride on the AC wave form. Radiated RFI is emitted through the air. There are many pieces of equipment that can generate RFI, variable frequency drives included.
  • The internal circuits of personal computers generate EM fields in the RF range.
3 0
3 years ago
Why is it difficult to detect a Trojan horse?
marishachu [46]

Answer:

Explanation:

Because the virus disguises it self as something you are trying to download, then it attackes your device

8 0
3 years ago
Read 2 more answers
Other questions:
  • Write a function `has_more_zs` to determine which of two strings contains # more instances of the letter "z". It should take as
    9·1 answer
  • Race conditions are possible in many computer systems. Consider a banking system with two methods: deposit(amount) and withdraw(
    14·1 answer
  • What are the requirements of a data dictionary ?
    7·2 answers
  • To insert a clip art you must do the following
    14·1 answer
  • What type of device can be used to block unwanted traffic initiated from the internet and can also restrict internet access from
    6·1 answer
  • What is a way to minimize technical problems with your computer
    12·1 answer
  • Any action that causes harm to your computer is called a
    15·1 answer
  • Which of the following statements best compares and contrasts hot and cold type?
    12·1 answer
  • Lucas wants to expand his vocabulary to better understand the sentence below. The insidious burglar moved through the house unhe
    7·2 answers
  • Compare mini and mainframe computer in terms of speed,memory and storage​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!