1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laiz [17]
3 years ago
9

Write a java program to input the corresponding data to print the result of the following expression

Computers and Technology
1 answer:
Anna71 [15]3 years ago
6 0

Answer:

The program in Java is as follows:

import java.util.Scanner;

public class Main{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 float a, b, c, x, y;

 a = input.nextFloat();

 b = input.nextFloat();

 c = input.nextFloat();

 x = input.nextFloat();

 y = a * x * x + b * x + c;

 System.out.print(y); }}

Explanation:

This declares all variables

 float a, b, c, x, y;

The next 4 lines get input for a, b, c and x

<em>  a = input.nextFloat();</em>

<em>  b = input.nextFloat();</em>

<em>  c = input.nextFloat();</em>

<em>  x = input.nextFloat();</em>

This calculates the value of y using y = ax^2 + bx + c

y = a * x * x + b * x + c;

This prints the calculated value of y

 System.out.print(y);

You might be interested in
How do you change your brainly lvl, it says I'm in collage but I'm in 8th grade :(
olga2289 [7]

Answer:

Awww

Explanation:

6 0
3 years ago
Read 2 more answers
Declaring a member as ____ in the base class provides access to that member in the derived classes but not to anyone else. a. pu
Sidana [21]

When a member is declared as b. <u>protected</u> in the base class, it provides access to that member in the derived classes but not to anyone else.

<h3>What is a derived class?</h3>

A derived class can be defined as a type of class that inherits the information or members of a base (parent) class such as a car in a syntax.

Basically, a public class is accessible to everybody while a private class can only be accessed by users within the declared class. Also, a constant is a class whose value remains unchanged.

In Computer programming, when a member is declared as <u>protected</u> in the base class, it ultimately provides access to that member only in the derived classes but not to other members or anyone else.

Read more on data types here: brainly.com/question/20264183

#SPJ1

6 0
2 years ago
which one of the following would not normally be found in an organization's information security policy?
kotegsom [21]

Requirement to use AES-256 encryption would not normally be found in an organization's information security policy.

When it comes to information security, organizations have a variety of different policies and requirements that they adhere to. One of those requirements is the use of AES-256 encryption.

However, not every organization has AES-256 encryption as a requirement in their information security policy. In fact, many organizations don't even know what AES-256 encryption is.

Why is AES-256 encryption relevant?

Well, AES-256 encryption is a strong form of encryption that is used to protect data. It is often used by governments and organizations to protect sensitive data.

AES-256 encryption is a requirement for many organizations because it provides a high level of security for data. Without AES-256 encryption, data could be compromised.

Learn more about information security policy here:

brainly.com/question/14292882

#SPJ4

4 0
1 year ago
The _____ stage of information technology planning outlines business processes that are central to achieving strategic goals and
bija089 [108]

Answer:

d. business area analysis

Explanation:

Business area analysis is the stage of information technology planning outlines business processes that are central to achieving strategic goals and helps determine which ones could most benefit from information technology.

Here the major focus is on planning the outlines required to achieve the central objective of business.

It outlines all the business process, the goals and helps to determine the most benefit from information technology.

3 0
3 years ago
Briefly explain the importance of doing backup in systems administration and explain in detail any three methods for performing
Dmitry_Shevchenko [17]

Answer:

Importance of backup in system administration:

Backups are crucial in system administrations for preserving continuity and protecting against specific types of hardware failures, service interruptions, and human mistakes. To aid a company in recovering from an unexpected catastrophe, backup copies make it possible to restore data to a previous point in time. To safeguard against primary data loss or corruption, it is essential to save a copies of data on a different media. When a system administrator create a backup, he makes a copy of the data that you can restore if your main data is lost. These errors may be the consequence of faulty hardware or software, corrupted data, or a human error like a targeted attack or an unintentional deletion. System backup and recovery is therefore a crucial skill for system administrators as well as the companies they work for.

Three methods for performing backup:

  1. Disk image: A efficient method to back up not only the files and directories but also everything else on the system is by creating a disk image. If a user have a disk image, the user can restore everything, including the operating system, applications, data, and more, so the user won't have to worry about any difficulties. Placing the  disk image-containing DVD into the DVD-ROM to restore the backup. Additionally, just attach an external HDD to the computer if the user have a disk image that they made.
  2. External hard drive: The most common backup method is to use an external hard drive or even a USB flash drive. An HDD can be easily, quickly, and affordably backed up. It is effective since consumers may carry their portable backup with them wherever they go.
  3. Cloud backup: Cloud backup or Online backup has been around for a while, but not many people really utilize it. But the greatest backup technique by far is cloud backup. The user does not have to worry about hardware problems because their files are saved in the cloud and can be accessed from anywhere because the backups are automatically produced and everything is synchronized. It is one of the greatest methods to backup, especially when you consider that the contents are encrypted and stored securely.

6 0
2 years ago
Other questions:
  • Of the following choices, what indicates the primary purpose of an intrusion detection system (IDS)?
    12·1 answer
  • How do u feel about distance learning in a paragraph?
    6·2 answers
  • Stella likes using social networking websites. Which Netiquette practice should Stella follow?
    9·2 answers
  • How to select the entire table in microsoft excel
    11·1 answer
  • What two windows tools can you use to know how much ram is installed on your system?
    10·1 answer
  • Convert binary number 11101111.10111 to decimal
    5·1 answer
  • What is the importance of internet safety?
    11·1 answer
  • What is the importance of charts and graphics in providing<br> information?
    15·1 answer
  • In remote areas,your gps device may lose reception. its good idea to have a
    13·1 answer
  • How do we find the time complexity for this algorithm?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!