1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lakkis [162]
3 years ago
10

(Java) Write a program that accepts a number of minutes and converts it both to hours and days. For example, 6000 minutes is 100

.0 hours or 4.166666666666667 days.​
Computers and Technology
1 answer:
iogann1982 [59]3 years ago
6 0
Import java.util.Scanner;
public class MinutesConversion {
private static Scanner inputDevice;
public static void main(String[] args) {
int minutes, hours;
float days; // float for decimal point

inputDevice = new Scanner(System.in);
System.out.println("Please enter minutes for conversion >> ");
minutes = inputDevice.nextInt();
hours = minutes / 60;
days = hours / 24.0f;


System.out.println(+ minutes + " minutes is " + hours + " hour(s) or" + days " days");
}
}
You might be interested in
Under normal operations, cisco recommends that you configure switch ports on which vlan
larisa86 [58]

 

You can configure switch ports on default VLAN under normal operations. Cisco switches always have VLAN 1 as the default VLAN, which is required for many decorum communications between switches like spanning-tree protocol for example. It is obligatory not to delete or even change the default VLAN.

 

 





3 0
3 years ago
There are a number of classifications that can be applied to security controls.
kodGreya [7K]

Answer:

Preventive control is not a classification that can be applied to security controls.

Explanation:

At the most basic level, we should protect resources and assets that are of value to an organization by mitigating the risk to those assets and resources. Security controls include any type of policy, technique, procedure, or solution that help mitigate risks. There are models that define security control objectives and are classified by control type and by function

By Control Type

  1. Physical control: Anything that can be touched and can be used to detect and prevent unauthorized access from adversaries and threat actors. Examples include CCTV, electric fences, Biometrics
  2. Technical controls: Examples include firewalls, AMSI solutions, IDSs and IPSs that help protect an organization’s resources and assets. They can be both hardware and software solutions.
  3. Administrative controls: These are the overall design of the protocols or guidelines that define business needs based upon the organization’s security goals that help implement a secure environment. Things like staff awareness and training are among the examples of administrative controls.

Learn more about Security Control classification

brainly.com/question/13239384

brainly.com/question/14409331

#LearnWithBrainly

5 0
3 years ago
__________ is a collection of formatting options—such as a frame, a rounded shape, and a shadow—that changes a picture’s overall
LenaWriter [7]

Answer:

Picture Style

Explanation:

According to my research on the Microsoft Word Software, I can say that based on the information provided within the question the term being mentioned in the question is called a Picture Style. This is a feature in Microsoft Word that allows you to apply a style or effect to a picture in order to enhance the way it looks or presents, such as a frame, shadow, or shape.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Which of the following methods is the easiest way to set up a VPN client on a computer for a user who is not technical?
Pie

Answer:

Option D.

Use CMAK to create an executable to install.

Explanation:

The CMAK is the Connection Manager Administration Kit it is a feature in Microsoft Windows that allows users to customize the remote connection experience for users on their network.

The CMAK can be simply used by the technical expert to remotely operate the client computer, and customize the VPN himself without the non-technical user having to do anything. This can be done for computers only on a network however.

3 0
3 years ago
Which area of the resource monitor is used to monitor disk performance and determine whether the disk subsystem is a bottleneck?
Dvinal [7]

Answer:Disk

Explanation:Disk is the storage device in which data can be rewritten and stored.They work in the computer system internally as well as externally as per the requirement

To evaluate the monitor disk performance and disk subsystem performance, it is checked whether the particular part of the computer system is working along with rest of the parts . If the working of the part is not along with other components then there will be a reduction in the performance of the system , as to keep that part on the track.

Disk is responsible for this tracking and pacing system.

7 0
4 years ago
Other questions:
  • On the CallCenterReport worksheet, add formulas that will summarize the issues for the department entered in cell B3. In cell B6
    13·1 answer
  • All waves consist of a continuous series of _____.
    11·2 answers
  • List several things that geographers can map using remotely sensed data
    5·1 answer
  • Which of these computers was marketed as a computer/game machine?
    15·2 answers
  • Identify ways you can manage a project using project management software
    14·1 answer
  • Write two scnr.nextInt statements to get input values into birthMonth and birthYear. Then write a statement to output the month,
    10·1 answer
  • Select the first ICMP Echo Request message sent by your computer, and expand the Internet Protocol part of the packet in the pac
    10·1 answer
  • Banks will pay you interest on your money based on the interest rate. True or false?​
    11·1 answer
  • What is bespoke software???​
    9·2 answers
  • Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!