1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelu [443]
3 years ago
7

ANSWERED CORRECT BELOW

Computers and Technology
1 answer:
ch4aika [34]3 years ago
8 0

Answer:

Explanation:

The Java code provided in the question works as intended. The nextInt() correctly outputs the random value from 1-10 while the nextInt(int min, int max) correctly outputs random values between the int and max parameters. I changed the int/max arguments to 3 and 12 and ran the program to demonstrate that the program is running as intended. Output can be seen in the attached picture below.

You might be interested in
The most commonly used network topology where network endpoints connect to a central device is called
arsen [322]
That would be a star network. A star network isn't necessarily shaped like a star, of course, but like you mention this topology has a central device, usually a server of some sorts, and then many different endpoints coming out of that central device, such as the client computers for the server.
6 0
3 years ago
An empty frame used to reserve space for a picture to be inserted at a later time is know as what
Anarel [89]

Answer:

placeholder

Explanation:

4 0
3 years ago
EBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a d
Bond [772]

Answer: d)Phishing

Explanation: Phishing is the activity that is used by the attackers or unauthorized parties to steal confidential information of individuals through emails, messages or calls.This activity is considered as cyber-crime as the unauthorized source present themselves as the legal and actual party to gain private information such as credit card details, personal details , etc.

The example mentioned in the question about eBay's security issue is also related with phishing  where the fraud mails are sent to the users to gain or steal their personal information.

Other options are incorrect because insider is a threat that happens in the organization or business field regarding the organizational data,dumpster diving is reviving data to execute an attack on operating system and social engineering is gaining personal information from an individual through manipulation .Thus, the correct option is option(d).

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

7 0
3 years ago
What year does futurist ray kurzweil believe ai will meet human intelligence?.
MariettaO [177]

Answer: 2029

Explanation:

3 0
2 years ago
Which network device regenerates the data signal without segmenting the network? modem?
Yanka [14]
Hub(s) is the answer
6 0
3 years ago
Other questions:
  • The length of a pencil would most likely be measured in:
    9·2 answers
  • explain in detail how such a company can improve the focus and relationship with customers, and what they will benefit from this
    14·1 answer
  • Write a program that takes a string as input from the keyboard, representing a year.
    10·1 answer
  • What is the output of the following function if the array nums contains the values 1 2 3 4 5 int backwards(int nums[]) { for (x
    15·1 answer
  • Write a program that performs the following tasks: Display a friendly greeting to the user Prompt the user for the value to conv
    13·1 answer
  • Which of these lines of code will increment a variable?
    11·1 answer
  • Suzanne is following a fad diet. She has started to experience low energy during her workouts, and on a recent trip to the docto
    10·2 answers
  • What is 3x10? PLZZZZZ
    11·1 answer
  • Have y’all enjoyed The new hero floryn from Mobile legends
    6·1 answer
  • What is the full form of RPM in computer ​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!