1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igomit [66]
3 years ago
7

JAVA

Computers and Technology
1 answer:
butalik [34]3 years ago
5 0

Answer:

import java.util.*;

public class MyClass {

   public static void main(String args[]) {

       Scanner input = new Scanner(System.in);

       System.out.print("Input a word: ");

       String userinput = input.nextLine();

       for(int i =0;i<userinput.length();i+=2) {

           System.out.print(userinput.charAt(i));

       }

   }

}

Explanation:

This line prompts user for input

       System.out.print("Input a word: ");

This declares a string variable named userinput and also gets input from the user

       String userinput = input.nextLine();

The following iterates through every other character of userinput from the first using iteration variable i and i is incremented by 2

       for(int i =0;i<userinput.length();i+=2) {

This prints characters at i-th position

           System.out.print(userinput.charAt(i));

You might be interested in
One of the difficult things about working in game design is that while there are many different roles, most of them only match o
Papessa [141]

Answer:

it's false

Explanation:

they don't match to personalities

6 0
2 years ago
In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
Ugo [173]

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

4 0
3 years ago
you are sitting in a coffee shop with your laptop computer and have connected to the internet through an unrestricted wi-fi conn
amm1812

Since you are sitting in a coffee shop with your laptop computer and have connected to the internet through an unrestricted wi-fi connection,this type of wi-fi connection called hotspot.

<h3>What is the difference between hotspot and Wi-Fi?</h3>

WLAN is a wireless technology for local area networks (Local Area Networks). While the hotspot uses wifi to connect wireless devices to the internet. Without wifi, a hotspot does not exist. whereas wifi is used to generate a hotspot.

Because it uses your cell phone number to authenticate, a mobile hotspot is a secure network. You should be prompted to create a password on your phone, which you can later use on other devices to access the internet. As opposed to accessing free public Wi-Fi, a mobile hotspot is safer and more secure because of this.

Therefore, A hotspot is a physical site where users can connect to a wireless local area network (WLAN) with a router connected to an Internet service provider to access the Internet, generally using Wi-Fi.

Learn more about internet  from

brainly.com/question/28078151
#SPJ1

7 0
1 year ago
Define time management and give two activities that you can do to help manage your tasks, homework, or projects better.
lions [1.4K]
Time management: <span>the ability to use one's time effectively or productively, especially at work also activities you can do would be organizing and making sure you get that essay done in under 30 mins </span>
5 0
3 years ago
What is the unit of measure ment to easure cpu speed
Hatshy [7]

Answer:

gigahertz (GHz )

Explanation:

A “cycle” is technically a pulse synchronized by an internal oscillator, but for our purposes, they're a basic unit that helps understand a CPU's speed

7 0
3 years ago
Other questions:
  • Which view is used to allow a publisher to view facing pages of a publication at the same time?  NormalMaster PageTwo-Page Sprea
    9·1 answer
  • _____ learners prefer to interact with others on group projects.
    8·1 answer
  • What is an image that you can apply to another image to add detail and texture?
    6·1 answer
  • Which major and minor keys have no sharps or flats apex?
    5·2 answers
  • Create a lottery game application. Generate three random numbers (see Appendix D for help in doing so), each between 0 and 9. Al
    14·1 answer
  • [15 points] 3.2 Lesson Practice (holy marry mother of joseph)
    7·1 answer
  • You can divide the code for an application into logical parts by moving some of the code from the main() method to other _______
    8·1 answer
  • What was your favorite animals, game, photo, friends,
    7·2 answers
  • Which Excel function or tool will you use to display the cells that are referred to by a formula in the selected cell
    8·1 answer
  • What is primary difference between the header section of a document and the body
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!