1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelu [443]
3 years ago
7

ANSWERED CORRECT BELOW

Computers and Technology
1 answer:
ch4aika [34]3 years ago
8 0

Answer:

Explanation:

The Java code provided in the question works as intended. The nextInt() correctly outputs the random value from 1-10 while the nextInt(int min, int max) correctly outputs random values between the int and max parameters. I changed the int/max arguments to 3 and 12 and ran the program to demonstrate that the program is running as intended. Output can be seen in the attached picture below.

You might be interested in
Stateful packet inspection firewalls ________. always do application content filtering have the slow speed of relay operation Bo
Evgesh-ka [11]

Answer:

Neither always do application content filtering nor have the slow speed of relay operation.

Explanation:Stateful packet inspection is a dynamic firewall filtering which filters the inflow and outflow of packets of Information from time to time. It is also known to act as monitor for the state of a connection in a Network system. The filtering decisions of a stateful inspection firewall is based on two facts

(1) The rules defined by the administrator

(2) The previous context developed based on the filtering that taken place before.

6 0
3 years ago
A computer uses a memory unit with 256k words of 32 bits each. A bina.ry
iogann1982 [59]

Answer:

Touch and hold a clip to pin it. Unpinned clips will be deleted after 1 hour.

4 0
3 years ago
Using Windows CMD, how would an attacker list all the shares to which the current user context has access?
Lapatulllka [165]

Answer:

NET USE

Explanation:

The windows CMD is a command line interface or terminal used to access information about the system. The CMD can be also used to rectify or troubleshoot problems in the windows environment. There are series of hard coded commands in this interface.

An attacker uses the command "NET USE" to remotely connects or disconnects a computer and can be used to list the current connections of a user's computer.

8 0
3 years ago
Write a method for the Invitation class that accepts a parameter and uses it to update the address for the event.
DerKrebs [107]

Answer:

public class Invitation {

 private String hostname;

 private String address;

  public Invitation(String n, String a) {  // constructor that accepts two strings.

   hostname = n;

   address = a;

 }

  public String getHostname() {

   return hostname;

 }

 public void setAddress(String a) {

   address = a;

 }  

 public String invite(String guest) {

   return "Hello" +guest+ ", you are invited to my party at " +address+". "+hostname+".";

 }

 public Invitation(String host, String address) {

   this.address = address;

   this.hostname = host;

 }

}

Explanation:

The Java program defines a class called "Invitation". The class constructor has two string arguments or parameters for the host of the event and the address. The invite method is used to generate the string invite message with the name of the guest as the argument. Use the "setAddress" method to set a new location of the event and the "getHostname" to get the name of the event host.

6 0
3 years ago
I wake up the computer and remind it what to do ​
kirza4 [7]

Answer:

what's the question or answer you want or is it a joke?

Explanation:

6 0
2 years ago
Other questions:
  • What following functions does browser perform
    5·1 answer
  • Which of the following are examples of software? Check all of the boxes that apply.
    12·2 answers
  • Jonas is an experienced security professional who recently accepted a position in an organization that uses Check Point firewall
    9·1 answer
  • Description A data retrieval tool that finds specified data within a database A collection of records All of the fields for a si
    7·1 answer
  • Alison is having a hard time at work because her Inbox is flooded with emails every day. Some of these emails are unsolicited. S
    15·2 answers
  • Which of the following transferable skills are generally the most look for in the it <br> field
    10·1 answer
  • Software that displays advertising material when online.
    12·2 answers
  • Write a C program that counts the number of vowels in a word. The C program reads words from an input file and then stores in an
    13·1 answer
  • Which statement is true about the storage media?
    10·1 answer
  • What year does futurist ray kurzweil believe ai will meet human intelligence?.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!