1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olegator [25]
3 years ago
9

Which method allows you to choose how to display the date and time?

Computers and Technology
1 answer:
Alja [10]3 years ago
8 0

FORMAT Is the Answer Hope it helps:)

You might be interested in
The laws governing search and seizure in the public sector are much more straightforward than those in the private sector. TRUE
Lapatulllka [165]

Answer:

True

Explanation:

Because of the contract that you have agreed to when joining the work force. Which is different from the private sector.

7 0
3 years ago
Print "userNum1 is negative." if userNum1 is less than O. End with newline Convert userNum2 to 0 if userNum2 is greater than 8.
Butoxors [25]

Answer:

import java.util.Scanner;

public class num1 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter User name 1 and 2");

       int userNum1 = in.nextInt();

       int userNum2= in.nextInt();

       if(userNum1<0){

           System.out.println("userNum1 is negative.");

       }

       else if(userNum2>8){

           userNum2 =0;

       }

       else{

           System.out.println("userNum2 is less than or equal to 8..");

       }

   }

}

Explanation:

This is implemented in Java programming language

Using the scanner class, the user is prompted to enter two numbers

These are saved in the variable userNum1 and userNum2 respectively.

If, else if and else statements are then used according to the specifications given in the question.

8 0
4 years ago
________________ are piece of programs or scripts that allow hackers to take control over any system.
Ber [7]

Answer:

Exploits

Explanation:

Exploits can be explained to be a piece of programmed softwares or scripts that can give hackers the opportunity to take control over any system and exploit this system's vulnerabilities. The vulnerability scanners that hackers use includes, Nessus, Nexpose e.tc.

They use these scanners above to search for vulnerabilities.

3 0
3 years ago
Short Answer:
alina1380 [7]
1) It's illegal because when you odometer on a vehicle you're tampering with the mileage to make it appear lower than what it actually is. 

2)Flashing your high beams is due to oncoming traffic or to alert the drivers. But it can mean different things. 

4) Locking your doors while drving is good idea because i feel like it's safer if you have kids and less likey to open in an a collision. 

5)Simply because, p<span>ower brakes are more powerful than standard breaks.

6) If you see your break light on, you should instantly check your break fluid and check your break pedal by pressing it hard to spot any indications of air or fluid. 

-Hope this help, couldnt answer three. </span>
8 0
4 years ago
What is a message called that is delivered by TCP? What is a message called that is delivered by UDP? At which layer do the two
Mrrafil [7]

Answer:

  • Transmission Control Protocol is a Transport Layer protocol.  
  • This protocol is connection oriented which means that a connection is set up before the data packets are transmitted between the source and destination host which is a very reliable way of data transmission.
  • The connection is established between the source and the destination, after this the data is transmitted between them and lastly the connection is ended or terminated after the data transmission.
  • The packet or a messages that is delivered by TCP is called segment.
  • Basically TCP divides the data into small parts or chunks which are called segments.
  • The segment has a header and data section.
  • The segment header is further divided into the following parts.
  • Source port (sending port), destination port (receiving port), sequence number which is allocated to the first byte in the segment so that if the segments at the destination are sent out of order then it will help to rearrange these segments, Acknowledgement Number is number that the acknowledgement number sender expects to receive, header length, control flags which are used to control connection set up, connection termination and flow control, window size that a sender is ready to receive, Checksum field enables error control, Urgent pointer which is used to refer to data that is urgently needed to reach the receiving phase as soon as possible.  
  • User Datagram Protocol (UDP) is a Transport Layer protocol and a part of Internet Protocol suite.
  • This protocol is connection-less which means there  is no need to establish a connection between source host and destination host prior to the transmission of data which is an unreliable data transmission way.
  • The message in UDP is called datagram .
  • Unlike TCP segments there is no need to consider the order in which datagrams are sent or received.
  • Datagram has a header part which contains routing information a data section which shows the data to be transmitted.
  • Header has source port, destination port, checksum and length fields.
  • TCP and UDP protocols work in Transport Layer.
  • This layer is responsible for end to end delivery of data between source and destination hosts.
  • It ensures reliable data transmission and manages flow control and also ensures that packets reach in the right order in which they were sent.
5 0
3 years ago
Other questions:
  • A document repository is down when you attempt to access it. which isa principle is being violated?
    13·1 answer
  • A computer professional who has access to sensitive information shares this information with a third party. Which professional c
    9·2 answers
  • Using a wireless network without the network owner's permission is known as ________.
    15·1 answer
  • What are the advantage of transistors over vacuum tubes?
    6·1 answer
  • Nevermind- I figured it out.
    14·1 answer
  • If everyone's choice for their computer printer were an hp laserjet 4100, there would be a ___ preference segment in the compute
    8·1 answer
  • Which law was established to prevent law enforcement agencies from accessing communication through telephone and digital mediums
    8·2 answers
  • Write a program that will compare two names. The program prompts the user to enter two names for a comparison. If the names are
    8·1 answer
  • Which of the following functions grows at a faster rate than the rest? (Points : 6)
    12·1 answer
  • Information systems include all of these
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!