1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
3 years ago
15

Program Convert Measurements:

Computers and Technology
1 answer:
worty [1.4K]3 years ago
6 0

on the truth is that the walls

You might be interested in
Which software documentation guideline did the IEEE establish?
Tomtit [17]

Answer:

B

Explanation:

I am big brain

8 0
3 years ago
A computer understand..............codes.<br>​
KiRa [710]

Answer:Computers only understand machine code - they do not understand high-level language code. Any high-level programming language code has to be converted to executable code. Executable code is also known as machine code which is a combination of binary code 0s and 1s.

Explanation:

6 0
3 years ago
A user profile has a login hour restrictions set to. Monday through A user profile has login hour restrictions set to. Monday th
Savatey [412]

Answer:

D

Explanation:

The user will be logged out and any unsaved work-in-progress will be lost.

In a computer program if a user has login hour restrictions this means that such a user will not be able to continue with his/her work when its past the restriction time.

Therefore at 5.01 pm the user will be logged out and any unsaved work-in-progress will be lost.

8 0
3 years ago
SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without es
Mashutka [201]

Answer:

A closed port that can not receive request from authorized users.

Explanation:

Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.

Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.

DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.

8 0
4 years ago
A variable like userNum can store a value like an integer. Extend the given program to print userNum values as indicated.(1) Out
dimulka [17.4K]

Answer:

The program in Java is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

 int userNum;

 Scanner input = new Scanner(System.in);

 System.out.print("Enter integer: ");

 userNum = input.nextInt();

 System.out.println("You entered "+userNum);

 System.out.println(userNum+" squared is "+(userNum*userNum));

 System.out.println(userNum+" cubed is "+(userNum*userNum*userNum));

 int userNum2;

 System.out.print("Enter another integer: ");

 userNum2 = input.nextInt();

 int sum= userNum + userNum2; int product = userNum2 * userNum;

 System.out.println(userNum+" + "+userNum2+" = "+sum);

 System.out.println(userNum+" * "+userNum2+" = "+product); } }

Explanation:

This declares userNum

 int userNum;

 Scanner input = new Scanner(System.in);

This prompts the user for input

 System.out.print("Enter integer: ");

This gets user input from the user

 userNum = input.nextInt();

Number (1) is implemented here

 System.out.println("You entered "+userNum);

Number (2) is implemented here

 System.out.println(userNum+" squared is "+(userNum*userNum));

 System.out.println(userNum+" cubed is "+(userNum*userNum*userNum));

This declares another variable userNum2

 int userNum2;

This prompts the user for another input

 System.out.print("Enter another integer: ");

This gets user input from the user

 userNum2 = input.nextInt();

This calculates the sum and the product

 int sum= userNum + userNum2; int product = userNum2 * userNum;

Number (3) is implemented here

 System.out.println(userNum+" + "+userNum2+" = "+sum);

 System.out.println(userNum+" * "+userNum2+" = "+product);

8 0
3 years ago
Other questions:
  • CNG and gasoline-powered vehicles use the same internal combustion engine, but different fuel types. A) True B) False
    8·2 answers
  • What advantage does a circuit-switched network have over a packet-switched network? What advantages does TDM have over FDM in a
    6·1 answer
  • What does it mean to clear a setting in a dialog box?
    14·1 answer
  • You want to securely erase data from your hard drive what can you use to do this and what is the process called
    12·2 answers
  • What is the meaning of the phrase the video has gone viral
    9·2 answers
  • Which weakness of web sites to launch attacks does an sql injection technique exploit?
    15·1 answer
  • Suppose that a computer has three types of floating point operations: add, multiply, and divide. By performing optimizations to
    7·1 answer
  • Match the feature to its function.
    7·1 answer
  • Working with text in presentation programs is very ____ using text in other applications.
    10·1 answer
  • Is there such thing as free will
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!