1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yanka [14]
3 years ago
12

Write a program that allows the user to enter their name from the keyboard. Allow the user to pick how many times they want thei

r name
printed to the screen. Print their name to the screen the number of times specified.
java

Computers and Technology
1 answer:
Sedaia [141]3 years ago
3 0

Answer:

zddd

Explanation:

You might be interested in
When James added a date field to a PivotTable, Excel grouped the date values into quarters, months, and years. He does not want
ivanzaharov [21]

When James clicks the Remove button on the PivotTable Tools Analyze tab is a true statement.

<h3>What is PivotTable?</h3>

A PivotTable is known to be a kind of interactive method that is used to quickly make a summary of large amounts of data.

Note that this table is one that a person can use to analyze numerical data thoroughly and it is known to be one that answer quick and unplanned questions about one's data.

Note that one can  remove the set date field without having any effect on the year or quarter fields.

Learn more about PivotTable from

brainly.com/question/15214258

7 0
2 years ago
Determine which system you would recommend each of the customers use based on their provided user and system specs.
Ratling [72]

Answer:

Hope this helps pls mark brainiest

Explanation:

<h2> </h2><h2>So we know Student B is gonna get a computer, but its not stated if its A desktop or laptop. hmm,.. So ima do both for the desktop he would what a computer with "Ethernet Storage Fabrics: 25GbE, 50GbE" because If he going to do videos in todays standers it would be in 4k and 8k. he would also need at least 16 of ram if not 32gb. and since he has no cap budget I would personally go for the i9, but he can go for the i7, not much of a fan of the i5 for video productive, for storage he would need a lot for video editing or other stuff so I would go for the main boot (sys) a  and for the actually storage for the videos I would go for a  with good rpm. For  I would go for something with 8-10 or higher.</h2>

7 0
2 years ago
The chain of _____ documents that the evidence was under strict control at all times and no unauthorized person was given the op
Arturiano [62]

Answer:

custody.

I hope I could help

4 0
2 years ago
From where do we get information or knowledge? Explain.
Tems11 [23]

Answer:

the explanations is down here,

Explanation:

Information

Data reaches a more complex level and becomes information by integrating them to a context. Information provides expertise about facts or persons. Example of information: The information about a date of birth still has very little value when it is unknown to which person it belongs. By adding more information like the name, the linked information creates knowledge about a person.

Knowledge

Knowledge thus describes the collected information that is available about a particular fact or a person. The knowledge of this situation makes it possible to make informed decisions and solve problems. Thus, knowledge influences the thinking and actions of people. Machines can also make decisions based on new knowledge generated by information. In order to gain knowledge, it is necessary to process information.

7 0
3 years ago
Read 2 more answers
Universal Container wants to understand all of the configuration changes that have been made over the last 6 months. Which tool
rosijanka [135]

Answer:

Set up audit trail

Explanation:

The administrator should set up an audit trail in order to get this information.

An audit trail would give him the record of all the configuration changes that have been made in a file or a database in the last 6 months.

Audit trails can be manual or electronic. It provides history and also documentation support. It can authenticate security and also help to mitigate challenges.

4 0
3 years ago
Other questions:
  • Help!!!!!!!!!!!!!!!!!!!
    12·1 answer
  • You have activated pop-up blockers in your web browser to prevent pop-up windows from continually interrupting your browsing exp
    14·2 answers
  • Jerry’s managing a Google Search campaign and would like to improve the position in which his ads appear. He’s increased his bid
    15·1 answer
  • What helped Taylor through her tough time with being bullied
    7·1 answer
  • Write a program that asks for the names of three runners and the time, in minutes (no seconds, etc.), it took each of them to fi
    7·1 answer
  • What is a benefit of the rise in citizen journalism? Multiple answer choice below
    13·1 answer
  • Please help me I need a help
    13·1 answer
  • Which of the following has the greatest impact on telecommunications design?
    12·2 answers
  • The bullet points above describe _____.
    7·1 answer
  • Which of the following is an example of machine learning?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!