1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
2 years ago
12

Find the error in the following code fragment. int a: System.out.print(a):​

Computers and Technology
1 answer:
trapecia [35]2 years ago
7 0

Answer:

If your using java, then its supposed to be "System.out.print("a")"    

Explanation:

its supposed to have quotations

You might be interested in
Substance abuse is an _____ coping mechanism.
hichkok12 [17]
Mental coping mechanism.
7 0
2 years ago
our client, Rhonda, has come to you for advice. Rhonda has recently graduated from college and has a good job with a large compa
Radda [10]

Answer:

See explaination for how to manage her personal risk

Explanation:

Personal risks can be described as anything that exposes you to lose of money. It is often connection to financial investments and insurance.

The basic things She can do to manage her personal risks are:

1. Saving:

Savings in much ways drastically reduces the percentage of risks and help you build confidence. Savings can help Rhonda manage her personal risks as savings helps one become financially secure and provide safety in case of emergency.

2. Investing:

After savings comes the major process, which is investment. It is rightly said, savings without invested proper is vain. Investment not only gives you returns or generates more profits but also ensures present and future long term financial security.

3. Reduce expenses:

A common man's expenses can never finish except it is controlled. Reduction in daily expenses can give a hike in savings and increase return on investment. Prompt planning can help cut in expenses.

5 0
3 years ago
What is it called when two or more devices connect together?.
fredd [130]

Answer:

When two or more computers are connected together so they can communicate with one another, they form a network. The largest computer network in the world in the Internet.

6 0
2 years ago
Read 2 more answers
Why is script used for pre-production?
Grace [21]

Explanation:

Pre-production formally begins once a project has been greenlit. At this stage, finalizing preparations for production go into effect. Financing will generally be confirmed and many of the key elements such as principal cast members, director and cinematographer are set. By the end of pre-production, the screenplay is usually finalized and satisfactory to all the financiers and other stakeholders.

During pre-production, the script is broken down into individual scenes with storyboards and all the locations, props, cast members, costumes, special effects and visual effects are identified. An extremely detailed shooting schedule is produced and arrangements are made for the necessary elements to be available to the film-makers at the appropriate times. Sets are constructed, the crew is hired, financial arrangements are put in place and a start date for the beginning of principal photography is set. At some point in pre-production, there will be a read-through of the script which is usually attended by all cast members with speaking parts, the director, all heads of departments, financiers, producers, and publicists.

5 0
3 years ago
Read 2 more answers
Tecty Motors Pvt. Ltd. has recently deployed RFID technology in the vehicles which allows the car owner to unlock the car with t
loris [4]

Answer:

The answer is B.

Explanation:

Radio Frequency Identification (RFID) is a technology that uses radio waves to  secure objects, pair devices, tag them etc. and it is made up of a transmitter which emits radio waves and a receiver.

The example given in the question where Jamie listens to the communication between the RFID tag and the devide of the user and copies the information to later use it to gain access to the vehicle is an example of a replay attack.

Also called "eavesdropping & replay", the first part is the listening to the conversation to steal the data and the replay part is where he uses the information to gain access.

I hope this answer helps.

7 0
3 years ago
Other questions:
  • You want to plug a keyboard into the back of a computer. you know that you need to plug the keyboard cable into a ps/2 port. whi
    9·1 answer
  • Help please brainliest
    8·1 answer
  • The possible states of a process are:
    6·2 answers
  • Write a program using nested loop to produce the following output:
    6·1 answer
  • A thin red border indicates the active cell. (True or False)
    12·1 answer
  • Physical activity such as sports or even a brisk walk can help reduce
    7·2 answers
  • What are the differences between a trap (aka software interrupt) and an interrupt (hardware interrupt)? What is the use of each
    12·1 answer
  • Instead of typing an individual name into a letter that you plan to reuse with multiple people, you should use a _______ to auto
    6·1 answer
  • Zoom meeting ID:987 6858 5587 Password:196133
    10·2 answers
  • Can someone give me an earsketch song of summer to turn in
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!