1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mice21 [21]
3 years ago
14

4. What is the package name in which the Scanner class resides?

Computers and Technology
1 answer:
Ahat [919]3 years ago
7 0
Related Articles. Scanner is a class in java. util package used for obtaining the input of the primitive types like int, double, etc. and strings.
You might be interested in
To add a picture file to a PowerPoint slide, a usor should first go to the
Murrr4er [49]

How to embed images in Powerpoint?

Click on the Pictures button to open the file browser. Now, browse to where your images are stored and click on them in the file browser. Choose Insert > Pictures on PowerPoint's ribbon, then browse to and choose the images you want to insert. Click on Insert to add them to your current slide

6 0
3 years ago
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (a
oksano4ka [1.4K]

Answer:

The program to this question can be defined as follows:

Program:

import java.util.*; //import package

public class Main //defining class

{

   public static void main(String[] as) //defining main method

   {

       Scanner ax= new Scanner(System.in);//create Scanner class object for user-input

       String val; //defining String variable

       int x;//defining an integer variable

       System.out.print("Enter string value first then numeric, and for exit 'quit & 0': \n");

       val = ax.next(); //input value

       x = ax.nextInt();//input value

       while(!(val.equals("quit") && x==0)) //Check value

       {

           System.out.println("Eating "+x+" "+val+" a day keeps the doctor away."); //print value

           val = ax.next(); //input value

           x= ax.nextInt(); //input value

       }

   }

}

Output:

Enter string value first then numeric, and for exit 'quit & 0':  

apple 5

Eating 5 apple a day keeps the doctor away.

shoes 2

Eating 2 shoes a day keeps the doctor away.

quit 0

Explanation:

In the above program, two variable "val" and "x" is declared, in which "val" is string variable and "x" is integer variable, in the next line, a while loop is declared, which can be described as follows:

In the loop, a condition is checked, that "val" is equal to "quit" and x is equal to "0", inside the loop, it will input value from the user-end.  

8 0
4 years ago
Read 2 more answers
A weakness of a system, process, or architecture that could lead to compromised information or unauthorized access is known as a
Anna11 [10]

Answer: vulnerability

Explanation:

3 0
2 years ago
A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now
Amiraneli [1.4K]

Answer: Virtualization

Explanation: Virtualization is the term that describes about creation of something than its actual version. In computer field , virtualization can happen in the storage devices, server elements,network components , operating systems etc.

The mechanism of virtualization helps in a creating a framework in which the resources is divided into multiple units so that more execution and processing can be done in operating system environment. So, the data center  has used the virtualization trend for the separate web servers

3 0
3 years ago
You have received a Word memo from your supervisor outlining the five-year strategic plan for your company, which operates in a
Maksim231197 [3]

Answer:

The correct option to the following question is C.) Rights Management Services.

Explanation:

The Right Management Services is also referred to as RMS or AD(Active Directory) RMS.

It is the MS Windows security tool which provides us with persistent data protections by enforcing our data access policy.

Our documents are protected with the RMS and the AD RMS, it is an application by which the documents are associated with and be RMS-aware.

It actually called the Windows RMS but its name was changed in MS Windows 2008, RMS to AD RMS.

7 0
4 years ago
Other questions:
  • Given : an int variable k, an int array currentMembers that has been declared and initialized, an int variable nMembers that con
    8·1 answer
  • Pat creates a table in a spread sheet
    9·1 answer
  • >>> import math >>> print(math.Pi) 3.141592653589793 >>> def print_volume(): print ("What is the radi
    12·1 answer
  • Which one of the following functional business systems supports the finance business function?
    7·1 answer
  • Which statements are true about modern
    9·1 answer
  • Given four files named asiasales2009.txt, europesales2009.txt, africasales2009.txt, latinamericasales2009.txt, define four ofstr
    12·1 answer
  • Write short cut of<br> fully justified​
    7·1 answer
  • an attacker is attempting to crack a system's password by matching the password hash to a hash in a large table of hashes he or
    9·1 answer
  • . An operating system is: *
    14·1 answer
  • Question2.<br> What are the functions of information technology?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!