1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
3 years ago
15

JAVA

Computers and Technology
1 answer:
agasfer [191]3 years ago
7 0

import java.util.Scanner;

public class JavaApplication53 {

   

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter Strings:");

       String txt1 = scan.nextLine();

       String txt2 = scan.nextLine();

       String newTxt = "";

       if (txt1.length() != txt2.length()){

           System.out.println("error");

       }

       else{

           for (int i = 0; i<txt1.length(); i++){

               newTxt += txt1.charAt(i)+""+txt2.charAt(i);

           }

       }

       System.out.println(newTxt);

   }

   

}

I hope this helps!

You might be interested in
(TCO G) _____ is when network managers deal with network breakdowns and immediate problems instead of performing tasks according
NeTakaya

Option D

Firefighting is when network managers deal with network breakdowns and immediate problems instead of performing tasks according to a well laid out plan.

<h3><u>Explanation:</u></h3>

Network management is a process of monitoring, operating and controlling the network. Various network managers spend most of their time firefighting- dealing with breakdowns and urgent problems.

If managers do not allocate enough time planning and organizing the network and networking staff, they are intended to be reactive rather than proactive in solving problems. A term that refers to reacting to network problems as they arise rather than relying on planned network management activity

4 0
3 years ago
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
Why do people yeet yeet and ree
DiKsa [7]

Answer:

Cause they are trying to be annoying

Explanation:

Something is wrong with them :)

8 0
3 years ago
Read 2 more answers
Tl;dr - i need a good application to bypass school firewall
just olya [345]

Answer:

dang. thats tough. i just used nord VPN

Explanation:

6 0
4 years ago
Read 2 more answers
Suppose your SOHO network connects to the Internet using cable modem. When you open your browser and try to access a web site, y
pantera1 [17]

Answer:

a) you must identify your operating system. Follow the instructions of your operating system.

b) Delete the browsing history in Internet Explorer, follow these steps:

Start Internet Explorer from the desktop.

Press Alt to display the menu bar.

On the Tools menu, click Internet Options.

Select all the checkboxes then click Remove.

Explanation:

Restart Internet Explorer and try it.

5 0
4 years ago
Other questions:
  • Why would Google combining information from separate accounts across its services and sites have privacy implications for its us
    11·1 answer
  • To what device, inside the computer, do all other devices connect
    10·2 answers
  • Which of the following correctly describes the reason for quality customer service?
    15·2 answers
  • Convert 234.43 (base 7) to base 10
    7·1 answer
  • Jamie posted all the journal entries into ledgers. After the postings, Jamie realizes that the debit side of the travel account
    10·1 answer
  • What function is the responsibility of the network layer?
    10·1 answer
  • On the piano, the pitches/notes used on the bass clef are located on what part of the keyboard?
    9·2 answers
  • 1. The Law of Superposition – the age of an object may be determined by the depth at which it is found, the deeper the object is
    14·1 answer
  • Please help meh T^T Which of the following describes an application error? Select 2 options.
    5·2 answers
  • Opposite word of reassembling​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!