1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maw [93]
3 years ago
5

What should you do first when designing a program?

Computers and Technology
2 answers:
Nady [450]3 years ago
6 0

Answer: talk about da progrm

Explanation:

faust18 [17]3 years ago
6 0

Answer:

Step-by step Explanation:

You might be interested in
In java write a program:A contact list is a place where you can store a specific contact with other associated information such
BigorU [14]

Answer:

import java.util.Scanner;

public class ContactInformation

{

public static String GetPhoneNumber(String[] nameVec, String[] phoneNumberVec, String contactName, int arraySize)  

{  

for(int i=0;i<arraySize;i++)

{

if(nameVec[i].equals(contactName))  

return phoneNumberVec[i];

}  

return "Contact doesn't exists!";

}

public static void main(String[] args)

{

int records;

Scanner sc = new Scanner(System.in);

System.out.print("Enter the size of contact List :");

records=sc.nextInt();

String[] contactNameList=new String[records];

String[] phoneNumberList=new String[records];

String contactName;

System.out.println("Enter the contact name and phone number :");

for(int i=0;i<contactNameList.length;i++)

{  

contactNameList[i]=sc.next();  

phoneNumberList[i]=sc.next();  

}  

System.out.println("Enter the name of the contact to be searched :");  

contactName=sc.next();

System.out.println(GetPhoneNumber(contactNameList,phoneNumberList,contactName,records));  

}  

}

Explanation:

In the following the function defined above for getting the contact

number on the basis of contact number provided we are checking the contact name list if we are able to find the contact name and if we did we return the contact number on the same index from the contact number list

which we found in the contact name list.

4 0
3 years ago
WEP (Wired Equivalent Privacy) has a design flaw which allowed attackers to break its encryption codes, WPA2 ( 2) has not suffer
ad-work [718]

Answer:

The answer is "True"

Explanation:

In computer science, the IEEE project uses this security project, it is designed for wireless network, that provides the same level security and the data encryption for cable network also.

  • It provides protects in wireless transmissions from both the poking and collecting information of packets.  
  • It also lets hackers crack their computer, that's why the given statement is true.
3 0
3 years ago
Which securities protect data through processes, procedures,decisions,and user pernissions. Determines where and how data can be
vovangra [49]

Answer:

Data can be stored on storage devices.

Explanation:

Network security, Application security and information security are the securities that protect data. Data can be stored on storage devices such as hard disk drives, solid state drives, external hard drives, USB flash drives and SD cards etc. Hard disk drives, floppy disks and tapes store data magnetically. The data can be stored with a device that spins the disk with magnetic coatings and heads has the ability to read and write information in the form of magnetic patterns.

5 0
3 years ago
I’m confused what any of this means can anyone help?
raketka [301]
The answer will be
97
98
96
194
5 0
3 years ago
A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.
alekssr [168]

Answer:

incremental

Explanation:

An incremental backup backs up only the files on a computer that have changed since the last time a backup was performed.

3 0
3 years ago
Other questions:
  • What is a valence orbit?
    13·2 answers
  • Consider the following method: public static void arrayMystery(int[] array) { for (int i = 0; i &lt; array.length - 1; i++) { if
    10·1 answer
  • If you want to wrap text so that it fits a particular cell size, which formatting section would you use?
    9·2 answers
  • What term is used to identify the visual interface that displays information it receives from the computer?
    11·1 answer
  • Task 2 Design a 1st order low-pass filter with cutoff frequency 1kHz, 1) with roll-off and 2) without roll-off. For each filter,
    10·1 answer
  • What are two examples of ways an electronic record may be distributed to others?
    15·1 answer
  • A descriptive study represents the highest level on the knowledge-level continuum.
    11·1 answer
  • Son opciones de configuración espacio multimedia llamado blog
    9·1 answer
  • Please write a Java program to read movies.txt file. (It is in Modules under Chapter Code) Create your own movies.ser file from
    14·1 answer
  • Why should information technology NOT be taught in school?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!