1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ipatiy [6.2K]
3 years ago
10

The font size on presentation slides should not be smaller than _____ -point.

Computers and Technology
1 answer:
nignag [31]3 years ago
6 0
12 point font should be the smallest font size that you use.
You might be interested in
Max magnitude Write a method maxMagnitude() with two integer input parameters that returns the largest magnitude value. Use the
Ira Lisetskai [31]

Answer:

The java program is as follows.

import java.lang.*;

public class Numbers

{

   //variables to hold two numbers

   static int num1=-8, num2=-2;

   //method to return integer with higher magnitude

   public static int maxMagnitude(int userVal1, int userVal2)

   {

       if(Math.abs(userVal1) > Math.abs(userVal2))

           return userVal1;

       else    

           return userVal2;

   }

public static void main(String[] args) {

    int max = maxMagnitude(num1, num2);

 System.out.println("The number with higher magnitude among "+num1+ " and "+num2+ " is "+max);

}

}

OUTPUT

The number with higher magnitude among -8 and -2 is -8

Explanation:

1. Two integer variables are declared to hold the two numbers. The variables are declared at class level (outside main()) and declared static.

2. The variables are initialized with any random value.

3. The method, maxMagnitude(), takes the two integer parameters and returns the number with higher magnitude. Hence, return type of the method is int.

public static int maxMagnitude(int userVal1, int userVal2)

4. This method finds the number with higher magnitude using the Math.abs() method inside if-else statement.

               if(Math.abs(userVal1) > Math.abs(userVal2))

                   return userVal1;

        else    

                   return userVal2;

5. Inside main(), the method, maxMagnitude(), is called. This method takes the two variables as input parameters.

6. The integer returned by the method, maxMagnitude() is assigned to a local integer variable, max, as shown.

      int max = maxMagnitude(num1, num2);

7. The result is displayed to the user as shown.

System.out.println("The number with higher magnitude among "+num1+ " and "+num2+ " is "+max);

8. The class variables and the method, maxMagnitude(), are declared static so that they can be used and called inside main().

9. The variable, max, is called local variable since it can be used only within the main() where it is declared. It is not declared static.

10. The class is declared public since it has the main() method and execution begins with main().

11. The program is saved with the same name as the name of the public class having main(). In this case, the program is saved as Numbers.java.

12. No user input is taken for the two input parameter values. The static variables can be assigned any integer value and the program can be tested accordingly.

8 0
4 years ago
Internet privacy refers to the level of information sharing on the web collected through web cookies, caches, and browsing histo
Zanzabum

The level of information sharing on the web that are mainly collected through web cookies, caches, and browsing history of a web browser is referred to as Internet privacy: True.

A web browser can be defined as a software program that is typically designed and developed for viewing a HTML document or browsing the Internet.

An Internet privacy refers to the level of privacy protection an end user has while browsing the Internet, especially with reference to the vast range of protocols, technologies, and frameworks (concepts) that are deployed.

This ultimately implies that, Internet privacy relates to the level of information sharing on the web that are mainly collected on a web browser through the following means:

  • Web cookies
  • Caches
  • Browsing history

Read more: brainly.com/question/3840341

6 0
2 years ago
For the Address Block 195.200.0.0/16 a. If you have 320 Customers that need 128 addresses/customer - will there be enough addres
Shkiper50 [21]

Answer / Explanation:

195.200.0.0/16

Note: Class C address can not be assigned a subnet mask of /16 because class c address has 24 bits assigned for network part.

2ⁿ = number of subnets

where n is additional bits borrowed from the host portion.

2ˣ - 2 = number of hosts

where x represent bits for the host portion.

Assuming we have 195.200.0.0/25

In the last octet, we have one bit for the network

number of subnets  = 2¹  =2 network addresses  

number of host = 2⁷ - 2= 126 network addresses per subnets

8 0
3 years ago
Winds can occur due to unequal heating within the atmosphere true or false?​
spin [16.1K]
True
Sorry if it’s wrong need to answer some before asking a question
7 0
4 years ago
The coding system that has just two characters is called:
cupoosta [38]

Answer:

A. Binary

Definition:

Pertaining to a number system that has just two unique digits 0 and 1. - binary code

6 0
3 years ago
Read 2 more answers
Other questions:
  • Once a business determines that change needs to occur, what ahould the
    12·1 answer
  • Internet-filtering software that electronically blocks out websites in specific rating categories is called _____________ by tho
    9·1 answer
  • When designing a website, describe 3 best practices you would give to your fellow classmate on effective web design that will ma
    9·1 answer
  • Jose needs to find out how to delete cells from his workbook.
    12·2 answers
  • A(n ________ is information that is passed to a function, and a(n ________ is information that is received by a function.
    15·1 answer
  • If you need to set up direct deposit, which information from your check would you likely need?
    7·2 answers
  • The requester of sensitive information should not receive access just because of his or her clearance, position, or rank. The re
    15·1 answer
  • Laura is using a rent to own store to purchase a computer valued at $1,000. She is paying $25 per week for 104 weeks(2 years). W
    13·1 answer
  • You learned that you can use the tags to insert a link to another webpage. One problem that webpage developers face is that, aft
    10·1 answer
  • Write the code for the following problem.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!