1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ber [7]
3 years ago
7

Help plz,l didn’t pay attention in class

Computers and Technology
1 answer:
castortr0y [4]3 years ago
5 0

Answer:

a) Input the marks value

b) Distinction

c) If marks =>50

d) Fail

Explanation:

The missing box entries in the flow chart from top to bottom are as follows -

a) Input the marks value

b) Distinction

c) If marks =>50

d) Fail

You might be interested in
(1) Prompt the user to enter two words and a number, storing each into separate variables. Then, output those three values on a
Sergeu [11.5K]

Answer:

import java.util.Scanner;

public class num3 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter Favorite color");

       String word1 = in.next();

       System.out.println("Enter Pet's name");

       String word2 = in.next();

       System.out.println("Enter a number");

       int num = in.nextInt();

       //Point One

       System.out.println("You entered: "+word1+" "+word2+

               " "+num);

       //Point Two

       String passwordOne = word1+"_"+word2;

       String passwordTwo = num+word1+num;

       System.out.println("First password: "+passwordOne);

       System.out.println("Second password: "+passwordTwo);

       //Point Three

       int len_passwrdOne = passwordOne.length();

       int len_passwrdTwo = passwordTwo.length();

       System.out.println("Number of characters in "+passwordOne+" :" +

               " "+len_passwrdOne);

       System.out.println("Number of characters in "+passwordTwo+" :" +

               " "+len_passwrdTwo);

   }

}

Explanation:

  • This question is solved using java programming language
  • The scanner class is used to receive the three variables (Two string and one integer)
  • Once the values have been received and stored in the respective variables (word1, word2 and num), Use different string concatenation to get the desired output as required by the question.
  • String concatenation in Java is acheived with the plus (+) operator.
3 0
3 years ago
a marketing company is setting up a new office in the city. which type of contract should they sign for periodic maintenance of
True [87]

Answer:

The contract they had to sign was a computer maintenance contract with computer service providers.

Explanation:

<em>Why </em><em>do companies have to </em><em>maintain computers</em><em> regularly? </em>

Because of all the activities of the company at this time on average use applications from computers. With the maintenance of computers, the activities of the company will continue to run well.

There are two types of maintenance that can be carried out:

  • Hardware Maintenance
  • Software Maintenance

#AnswerForTrees

8 0
2 years ago
Use the drop-down menus to complete statements about archiving and backing up data fileArchiving data files manages the size of
svetoff [14.1K]

Answer:

Archiving data files manages the size of a mailbox for  

✔ local

storage.

Creating an Outlook data file  

✔ protects

data files in storage on a computer.

Explanation:

Because its right.

3 0
3 years ago
Read 2 more answers
As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them.
Aliun [14]

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

  • This attack is aimed to avoid legal customers of one's website from accessing it.  
  • In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  
  • One other way to successfully attack is to send fake requests from the attacker.
5 0
2 years ago
When would it be necessary to shoot in 4K according to the presentation?
Nataly_w [17]

Answer:

because it provides you a lot of storage and the post production equipment to handle it and it is used to do big projects

Explanation:

so l know this much it is correct please mark me brainllest

6 0
2 years ago
Other questions:
  • A(n) _______ allows an attacker to use a network structure to send large volumes of packets to a victim.
    5·1 answer
  • Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of ciph
    7·1 answer
  • How to tell if motherboard has bluetooth?
    8·1 answer
  • Meaning of page break​
    8·1 answer
  • 50 points!!!!!
    9·2 answers
  • Communication of a message between two processes implies which of the following? (A) Synchronization (B) Atomic operation (C) Bl
    11·1 answer
  • When does the following while-loop stop running?
    10·1 answer
  • Functions are used to _________
    10·1 answer
  • Which workbook view is used most often in Excel?
    8·1 answer
  • What are some of the most common obstacles in video games?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!