1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
13

What is the output by the code system.out.print(8-4+2);

Computers and Technology
1 answer:
Nonamiya [84]3 years ago
4 0

Answer:

6

Explanation:

You might be interested in
Which is true about TCP and UDP? Choose two answers.
natulia [17]

Answer:

Explanation:

TCP Transmission Control Protocol, is an internet protocol to exchange data, is one of the most main protocols of the internet is used from the beginning, with UPD is used to transfer data too, but is less secure than TCP, but is faster than TCP, in this case, UDP is used to transfer music or videos, and TCP is used to transfer websites and database.

3 0
4 years ago
Write a regular expression of the language havingstrings that either start or end with "00" and have nomore zeroes. Where the al
Brut [27]

Answer:

001*|1*00

Explanation:

The language consists of strings in {0,1} that either start with 00 or end with 00 and have no more zeros.

The requirement can be divided into two parts:

1) Strings that start with 00 and have no more zeros

2) Strings that end with 00 and have no more zeros

Generating regular expressions for these parts:

1) 001*  - starts with two zeros and can have zero or more 1s later

2)1*00  - starts with zero or more 1s and ends with two zeros

So on combining with the or operator(|), the overall regular expression for the strings in the language becomes:

001*|1*00

3 0
3 years ago
How will Information Technology Fundamental improve on nursing career.​
ratelena [41]

Answer:

One of the primary ways that informatics has changed nursing practice is through documentation. ... Health informatics is also an important part of care coordination in nursing. The ability to track staffing, workflow and communication can help nurses to identify areas where current processes can be improved.

3 0
3 years ago
Read 2 more answers
The website’s________ section will enable Lana to add her company website name and logo to the top of every page of the website.
Delicious77 [7]

It is the header section of the website.

5 0
3 years ago
At what point in a vulnerability assessment would an attack tree be utilized?
ella [17]
During threat evaluation - A vulnerability assessment is done to gauge the impact expected from a successful attack and also how vulnerable the software is to an attack. An attack tree, when created during the threat evaluation phase allows one to analyze and describe possible attacks that can be realized on the system.
6 0
3 years ago
Other questions:
  • Please help will mark brainiest
    8·1 answer
  • The number 84 is divisible by 2,3,4 and 6. true or false
    13·2 answers
  • True or False? At any point in time, an open file has a current file pointer indicating the place where the next read or write o
    15·1 answer
  • 4
    15·2 answers
  • Can someone help me get spotify premium
    7·2 answers
  • Computing devices translate digital to analog information in order to process the information
    12·1 answer
  • You are developing a Website that is going to be viewed extensively on smartphones and tablets. Which of the following should yo
    7·1 answer
  • Write a c program that reprints input so that no line is longer than 50 characters. Specifically, for lines less than or equal t
    5·1 answer
  • Travelers should keep their profile information up-to-date. which is not an option for a traveler to update their own profile in
    6·1 answer
  • data is transmitted in plain text. this is a: group of answer choices brute force attack session hijacking dictionary attack cry
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!