1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xenn [34]
3 years ago
5

A restaurant recorded the ages of customers on two separate days. You are going to write a program to compare the number of cust

omers in their twenties (ages 20 to 29). What is the missing line of code to count the number of customers in their twenties? customerAges = [13, 3, 11, 24, 35, 25, 15, 18, 1] count20s = 0 if 20 <= item <= 29: count20s = count20s + 1
Computers and Technology
1 answer:
nikklg [1K]3 years ago
4 0

Answer:

You will need to implement a for loop ( I am assuming this is java)

Explanation:

int count20s = 0;

for(int x =0; x< customerAges.length;x++){

if(20 <= customerAges[x] && customerAges[x] <= 29){

     count20s++;

}

You might be interested in
If you do a Find and Replace for a term, where will Word begin looking for the term?
Norma-Jean [14]

Answer:

It automatically begins at the start of the document.

If you're using a search box, It will begin at the insertion point.

Explanation:

{}

6 0
3 years ago
Ian kno da answer tell me
kirill115 [55]

Answer:

b

Explanation:

7 0
3 years ago
Read 2 more answers
Henry uploaded the photos of his birthday to a cloud storage system. He feels that it’s a safe option for data storage. His frie
sattari [20]

Answer:

E. The data is not under the owner’s direct control.

Explanation:

Disadvantages of cloud storage:

  • Need for internet connection: We need to accept the fact that the internet connection, whether by broadband, 3G, 4G or 5G. Opening and retrieving data in the cloud becomes impossible without the internet.
  • Mistrust: Security breaches are very rare, especially if your content is stored on large enterprise servers that invest heavily in security.
  • Internet laws are unclear - and are different in each country: Because servers are scattered around the world, cybercrime is a doubt: in case of a leak, the hacker should be tried according to the virtual laws of the country in which is the server or country of the user who uploaded these files?
  • Price: Yes, there are free options, but companies and business owners who create and access large volumes of files may need paid plans to meet their needs.
5 0
4 years ago
Describe how being a global citizen in the world of advanced technology can be beneficial to your success in meeting your person
olga55 [171]

Answer:

well you could have more options of careers and more possibilities, online jobs can pay more and give more experience to the employees

7 0
3 years ago
Please help!!!
skad [1K]

Answer:

B

Explanation:

Problem and Solution

7 0
3 years ago
Read 2 more answers
Other questions:
  • What does iSCSI stand for?
    5·2 answers
  • Ruby is creating a presentation. She wants each slide displayed at intervals of five seconds. Which feature in the presentation
    6·2 answers
  • What is the automotive name for the large wires that allow more electrical current to flow ?
    12·1 answer
  • The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer sy
    14·1 answer
  • A program uses two classes: dog and poodle. which class is the base class and which is the derived class?
    7·2 answers
  • Which of the following speeches is an example of a demonstration speech? a. “Who was Abraham Lincoln” b. “The Human Brain and it
    5·1 answer
  • in Python we use IDE ( lntegrated Dvelopment Environment ) to write down the program data points of difference between script mo
    13·1 answer
  • Ssssssssssssssssssssssssssssssssssssssssssssssssss 100 points for this answer too.
    10·1 answer
  • What is HTML? Write some future of HTML.<br>follow for follow ​
    15·2 answers
  • What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!