I would say it is <span> B. the history of modern interior design
Because this subject stretches pretty far into history</span>
Answer:
import java.util.Scanner;
import java.lang.*;
class Main
{
public static void main(String args[])
{
int n;
//For capturing the value of n
Scanner scanner = new Scanner(System.in);
System.out.println("Enter the value of n:");
//The entered value is stored in the var n
n = scanner.nextInt();
int k=1;
printnum(n,k);
}
public static void printnum(int n,int k)
{
if(n%2==0)
{
for(int i=k;i<=n-1;i=i+2)
{
System.out.print(i);
}
System.out.println("");
}
else
{
for(int i=k;i<=n-1;i=i+2)
{
System.out.print(i);
}
System.out.println("");
}
n--;
if(n<=1)
{
System.exit(0);
}
else
{
printnum(n,k+1);
}
}
}
Explanation:
The program is self explanatory.
Answer:
//here is code in java.
import java.util.*;
class Solution
{
// main method of class
public static void main (String[] args) throws java.lang.Exception
{
try{
// declare an initialize first string variables
String st1="hello";
// declare an initialize first string variables
String st2="world";
// create another string variable
String st3;
// exchange the value of both string variables
st3=st1;
st1=st2;
st2=st3;
System.out.println("value of first String after exchange: "+st1);
System.out.println("value of second String after exchange: "+st2);
}catch(Exception ex){
return;}
}
}
Explanation:
declare and initialize two string variables.Create another string variable "st3". first assign value of "st1" to "st3" after then value of "st2" to "st1" and then assign value of "st3" to "st2". This will exchange the values of both the string.
Output:
value of first String after exchange: world
value of second String after exchange: hello
Answer: (C) MAC
Explanation:
MAC is stand for the message authentication code and it is one of the key dependent hash function. Message authentication provide the data integrity and also the origin of data authentication.
- It basically allow the specific recipients known as the holder of the symmetric key.
- The message authentication code uses the CBC (Cipher block chaining) mode for constructing the MAC algorithm and it also uses the block cipher for the conjunction by using the CBC operations.
On the other hand, all the options are incorrect as they are not the key dependent hash function.
Therefore, Option (C) is correct.
It would be C- crop. This allows you to specifically delete parts of the image using drag and drop features. Hope this helps!