1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
4 years ago
12

JAVA

Computers and Technology
1 answer:
shusha [124]4 years ago
5 0

public class JavaApplication64 {

   

   public static void main(String[] args) {

       int count = 0;

       for (int i = 23; i <= 89; i++){

           if (count == 10){

               System.out.println("");

               count = 0;

           }

           System.out.print(i+" ");

           count += 1;

       }

   }

   

}

I hope this helps!

You might be interested in
To override a method in a subclass, the method must be defined in the subclass using the same signature and compatible return ty
emmainna [20.7K]

Answer:

c would be the answer as i write it in my exam hope it will help you sooon

7 0
3 years ago
You are an administrator of a growing network. You notice the network you have created is broadcasting, but you cannot ping syst
Nonamiya [84]

Answer:

Network bridge

Explanation:

You are an administrator of a growing network. You notice the network you have created is broadcasting but you cannot ping systems on different segments of your network. What device should you use to fix this issue?

✓ Network bridge

3 0
2 years ago
Which of these are examples of skills?
Allushta [10]

Answer:

bruh

Explanation:

momento

8 0
3 years ago
Read 2 more answers
which one of the following would not normally be found in an organization's information security policy?
kotegsom [21]

Requirement to use AES-256 encryption would not normally be found in an organization's information security policy.

When it comes to information security, organizations have a variety of different policies and requirements that they adhere to. One of those requirements is the use of AES-256 encryption.

However, not every organization has AES-256 encryption as a requirement in their information security policy. In fact, many organizations don't even know what AES-256 encryption is.

Why is AES-256 encryption relevant?

Well, AES-256 encryption is a strong form of encryption that is used to protect data. It is often used by governments and organizations to protect sensitive data.

AES-256 encryption is a requirement for many organizations because it provides a high level of security for data. Without AES-256 encryption, data could be compromised.

Learn more about information security policy here:

brainly.com/question/14292882

#SPJ4

4 0
2 years ago
D. The 7-bit ASCII code for the character '&amp;' is:
insens350 [35]

Answer:

00100110

a and d are invalid sequences because they contain an even number of 1's.

Explanation:

Odd parity means that you want an odd number of 1's in the resulting set of bits. Since there are 3 (=odd) bits in the set, a zero must be added to keep the total odd.

6 0
4 years ago
Other questions:
  • Why is it helpful hat the ribbon tabs can collapse
    10·1 answer
  • "Most of us know that when we come into a college classroom, we will see desks and chairs, a computer station and a projector. A
    6·1 answer
  • Why have the 'taskmasters' been answering questions so long but they're still only at the ambitious rank?
    14·1 answer
  • Diane is receiving a lot of unwanted e-mail. What steps can she take to reduce the amount of e-mail she receives?
    12·1 answer
  • What is the name of the formal procedure scientists use to study the world around them?
    14·2 answers
  • A woman puts on a business suit. Which post-WWII fashion does her clothing typify?
    12·2 answers
  • 3. It is used to measure the resistance on ohms and voltage that flow in circuit both AC and DC current. A. Gadget C. Electrical
    12·1 answer
  • In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.
    7·1 answer
  • What is a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide, complete with transitio
    7·2 answers
  • An operating system with _____ capabilities allows a user to run more than one program concurrently.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!