1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
3 years ago
5

java program question- when I type letter then the txt file1 can read to txt file2 and the output file2 answer. For example, btw

in file1 and By the way in txt file2. When I type btw use dialog box and output will show By the way in the console but words come from txt file2.
Computers and Technology
1 answer:
AVprozaik [17]3 years ago
5 0
Don’t use that link!! They always comment under my stuff and other people have told me that’s just to get your information and location and stuff like that! Be safe and have a nice day
You might be interested in
Cryptography is the science of secret writing. Cryptography involves creating written or generated codes that allow information
Rudiy27

Answer:

true

Explanation:

the answer is true dude

5 0
2 years ago
When defining an array of class objects, how do you pass arguments to the constructor for each object in the array?
Nuetrik [128]
Basically, the array[ index ] is the name of the object so when you  populate the array you'd have statement[s] like:

array[ index ] = new ClassName( arg0, arg1, arg2 );
8 0
3 years ago
What does the average function do in a spreadsheet?
givi [52]
This article describes like shows the formula syntax and usage of the AVERAGE<span>  function in Microsoft Excel</span>
8 0
4 years ago
IT professionals should help to protect users’ personal information, such as bank account information or Social Security numbers
sesenic [268]

To prevent theft of account information, identity theft, money, important passwords, and personal information.


Hope it helps ❤️

8 0
4 years ago
Read 2 more answers
If several programs or apps are running simultaneously, your computer or device might use up its
kirill [66]

Answer: I am pretty sure it's RAM

Explanation:

I'm not 100% positive bc I haven't gotten my scores back yet but I think that's it.

7 0
3 years ago
Other questions:
  • What is the danger in judging someone according to his or her social networking profile
    12·1 answer
  • What does "WPA" stand for?
    15·2 answers
  • If the boolean expression a is true and b is false, the value of the logical expression a or b is ________.
    14·1 answer
  • The array index can be any nonnegative integer less than the array size.
    10·1 answer
  • Explain Hayflick limit and why are HeLa cells able to live beyond the Hayflick limit?
    14·1 answer
  • Create a program that will play the “cows and bulls” game with the user. The game works like this: Randomly generate a 4-digit n
    15·1 answer
  • Cpu coolers are typically made using what two different types of materials?
    6·1 answer
  • Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers, asymmetric cipher
    8·1 answer
  • Why is internet download speed slower on a computer vs phone
    9·1 answer
  • An Accenture healthcare client is interested in implementing an Artificial Intelligence (AI) solution to improve patient care, b
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!