1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
3 years ago
11

Java Eclipse homework. I need help coding this

Computers and Technology
1 answer:
erik [133]3 years ago
3 0
What issues are u having... what part is challenging you
You might be interested in
7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem
Stells [14]

Answer:

The concealment cipher.

Explanation:

A concealment cipher also known as null cipher can be defined as an obsolete encryption format that typically involves the mixture of plaintext with non-cipher elements. This ultimately implies that, the plaintext is hidden in another message through encryption.

The concealment cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem.

Basically, the concealment cipher is solely dependent on the clues of the physical factors that mainly affects the sender and receiver in a communication system.

7 0
3 years ago
You are frustrated to find that the only way to contact the customer service department is to make a phone call. The number list
Mademuasel [1]

Answer:

Option A; MINING THE SOCIAL MEDIA INPUTS.

Explanation:

Customer relationship management (CRM) is an approach to manage a company's interaction with current and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.

Social media mining is the process of obtaining big data from user-generated content on social media sites and mobile apps in order to extract patterns, form conclusions about users, and act upon the information, often for the purpose of advertising to users or conducting research.

The number listed from phone call would result in long distance charges to your phone bill, therefore, the issue of MINING THE SOCIAL MEDIA INPUTS should be addressed by the company to keep its CRM in line with your expectations.

3 0
3 years ago
Gina works in an SDLC team. When Gina makes changes to a file, no one else is allowed to acess it. Which type of version control
Dmitry [639]

Answer:

A. file locking.

Explanation:

File locking in computer technology is a data management mechanism used by software developers to completely restrict access of other users to a software program or computer file by granting permissions to only one user who can delete, modify or edit the application program at any point in time. This simply means that in the software development life cycle (SDLC), file locking is used to avoid interceding update on a particular software by restriction of other users while it's being modified by another user.

For instance, if two users (Gina and Mike) open the same software program, Gina then proceed to modify and save the changes. If Mike also modifies the software program and saves it, this would overwrite Gina's update. Hence, in order to prevent this type of conflict in software development, it is highly recommended that a file locking mechanism is adopted.

<em>This ultimately implies that when Gina make changes to a file, no one else is allowed to access the file because a file locking mechanism is being used by Gina's company as a version control process. </em>

8 0
4 years ago
Write an expression whose value is the concatenation of the three str values associated with name1, name2, and name3, separated
enyata [817]

Answer:

name1 + "," + name2 + "," + name3 // concatenation of the three values

Explanation:

Following are the description of statement

  • The "+" operator is used for the concatenation purpose of the three str values.
  • In the given question the name1 variable contains "Neville" ,name2 contains  "Dean" and name3 contains "Seamus".
  • Firstly we have given the name1 after that give the comma then we use "+" for the concatenation purpose and give the name2 again we will comma and finally, we will give the variable name3 by using "+" operator.
6 0
3 years ago
Which game console was the first to use the Blu-ray disc as a distribution medium
Viefleur [7K]

Playstation 3 is the correct answer

6 0
4 years ago
Other questions:
  • VW discovered that its engineers had developed a software program that allowed some of its car models to run without emissions c
    14·2 answers
  • What does ADF means????
    13·2 answers
  • I - For any two points on the Internet, there exists only one path between the two points II - Routing on the Internet is fault
    12·1 answer
  • Define a void function that calculates the sum (+), difference (-), product (*), quotient (/), and modulus (%) of two integer nu
    14·1 answer
  • Which changes should be made to establish and maintain formal writing conventions? Select two options.
    10·1 answer
  • How do you know where the home row of the keyboard is?
    14·2 answers
  • Does anyone know how to unblock websites on a school chromebook?
    6·2 answers
  • _____ use patterns to find solutions instead of using the if-then-else rules that expert systems use.
    13·1 answer
  • How to make classs constructer java.
    14·1 answer
  • What is the output of the code? (CHECK IMAGE)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!