1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
3 years ago
13

Write a function called random_marks. random_marks should #take three parameters, all integers. It should return a #string. # #T

he first parameter represents how many apostrophes should #be in the string. The second parameter represents how many #quotation marks should be in the string. The third #parameter represen
Computers and Technology
1 answer:
Damm [24]3 years ago
4 0

Answer:

Explanation:

The following code is written in Java. It creates the function random_marks as requested. It uses three for loops to go concatenating the correct number of apostrophes, quotes, and pairs to the output string before returning it to the user. A test case was added in main and the output can be seen in the attached picture below.

class Brainly {

   public static void main(String[] args) {

       String output = random_marks(3,2,3);

       System.out.println(output);

   }

   public static String random_marks(int apostrophe, int quotes, int pairs) {

       String output = "";

       for (int x = 0; x < apostrophe; x++) {

           output += '\'';

       }

       for (int x = 0; x < quotes; x++) {

           output += '\"';

       }

       for (int x = 0; x < pairs; x++) {

           output += "\'\"";

       }

       return output;

   }

}

You might be interested in
You have a notebook computer and wish to connect to an IEEE 802.11n wireless network. The computer does not have a built-in wire
Ira Lisetskai [31]

Answer:

The wireless adapter to use is the Wireless USB 2.0 Extender

Explanation:

The Wireless USB 2.0 Extender is a USB component that enables a computer to connect to and communicate with other computers on a network, or even to connect to the internet.

It uses an IEEE 802.11g radio platform and communicates within a radio frequency range of 2.4GHz.

Therefore, in cases where a notebook computer does not have a built-in wireless LAN card or PC card interface, you can use the Wireless USB 2.0 Extender as the best solution to that problem.

3 0
3 years ago
An educational institution has a number of buildings in the campus. Each building has its own independent network system, and al
Aloiza [94]
Answer: star topology.

Explanation:

The layout of the way how the computers in a netword are interconnected is called network tipology.

Some types of network topologies are:

1) Point-to-point tipology: all the computers are connected to each other directly (computer-to-computer, in pairs, this is a direct link between each two computers).

2) Bus topology: all the nodes (computers or server) are connectect to a maing cable.

3) Star topology: all the computers are connected to a central computer or server which is called central hub. This is the layout described in the question.

4) Ring topology: the computers are connectec in a circular path; each computer is connected to the next computer.

5) Mesh: every computer is connected to every other computer.




8 0
3 years ago
Read 2 more answers
What is the full path and filename for the file on a Debian Linux distribution that displays the time zone settings?
lesya [120]

Answer:

/etc/timezone

Explanation:

Debian based Linux distribution is a free distribution software and an operating system. It is composed of a open source and free source software. It is one of the most popular distributions.

A computer file name is a unique system of identifying the computer stored file in the file system. The names of the different file system have different formats or extensions in the file name and imposed different file restrictions.

In the context, the full path and the file name of a file that displays a time zone settings on a Debian Linux distribution is " ../etc/timezone".

3 0
3 years ago
What keyboard key can you press to limit the angle of the line when using the pencil tool?
leva [86]
F6,p hope that helps :)
6 0
3 years ago
Why should we be concerned about HVAC systems when discussing security?
lana66690 [7]

Answer:

 HVAC is stand for the heating, ventilation and the air conditioning system that basically perform various type computer management and operation system. It also helps to improve the productivity of the system.

 As, HVAC system is very concerned about the security as it basically include various types of toxic chemical in the environment that include various types of criminal and terrorist activities and natural disaster.

The HVAC systems are easily cause various accidental cases due to its complexity nature. It also performing various types of function in the management sector like maintenance, system updating function an remote controlling maintenance.

4 0
3 years ago
Other questions:
  • True or False: clicking ads and pop-ups like the one below could expose your computer to malware.
    11·2 answers
  • ________ is installed into special, read-only memory of devices like printers and print servers or devices used for various type
    13·1 answer
  • How do I attach a file on the computer?
    13·1 answer
  • The box formed by the intersection of a row and column in a spreadsheet program is known as a ________.
    13·1 answer
  • The major objective of this lab is to practice class and object-oriented programming (OOP), and separate files: 1. We will reuse
    5·1 answer
  • In theory, a(n) _____ can be an independent centralized database management system with proper interfaces to support remote acce
    15·1 answer
  • __________ is the order of arrangement of files and folders.
    6·1 answer
  • Please help!<br><br> What is a non-iterative programming structure?
    11·1 answer
  • What is alfred anderson in creole?
    6·1 answer
  • Fix the code :)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!