What is the output for the code below?
int total
0;
for (int i
15; i >= 0; i--)
{
total++;
}
System.out.print (total);

Answers

Answer 1
What is output by the code below? int[] array = {33,14,37,11,27,4,6,2,6,7}; System .out.println(array.length); ... int[] array = {5,10,3,6,9,15}; ... int total = 0; ... output by the code below? int j=1, tally=0; while(j<9) { tally++; j++; } System.out.print(tally);.
From quizlet

Related Questions

Which of these protections covers creative works such as books and artwork?
Choose the answer.

A. trademark

B.registered trademark

C.patent

D.copyright

Answers

The answer is D copyright

at the transport layer in the internet model, tcp is responsible for breaking large files received from the application layer into smaller messages and opening a connection to a server for transferring them.

Answers

In the internet paradigm, it is true that tcp is in charge of splitting huge files received from the application layer into smaller messages and establishes a connection to a server for their transfer.

A communications protocol known as Transmission Control Protocol, or TCP, permits message transmission between computer hardware and software via a network. It is designed to transmit packets across the internet and to guarantee the successful transmission of data and messages over networks.

With end-to-end communications offered by TCP/IP, it is possible to specify how data should be broken up into packets, transported, routed, and received at the destination. This outlines the process for exchanging data online.

Learn more about tcp:

https://brainly.com/question/24967184

#SPJ4

The complete question is ''At the __________ layer of the 5 layer Internet model, the TCP protocol is responsible for breaking large files received from the application layer into smaller packets and opening a connection to a server for transferring the packets. (use the one word​ name, not number)''.

can someone help me answer this ASAP. I’ll give a brainliest to whoever can answer correctly. Thanks :)

Answers

Answer: The correct answer is B




Explanation:

Hope wants to add a third use at the end of her nitrogen list.

What should Hope do first?

What is Hope’s next step?

Answers

Answer:the first answer is put it at the end of 2b

the second answer is press enter

Explanation:

Answer:

1,  put it at the end of 2b     2, press enter key

Explanation:

What is the next line?
>>> tupleA = (5, 20, 30, 40, 30)
>>> tupleA.index(30)
OO
0 1
03
02
Look at the picture

Answers

Answer:

The answer is "2"

Explanation:

Following are the modified code to this question:

tupleA=(5, 20, 30, 40, 30)#defining a list tupleA that holds multiple integer value  

print(tupleA.index(30))#defining print method that use a index method to print index value

In the above code, a list of integer variable tupleA is declared, that holds numbers, in the next step, tupleA is used with an index method, that holds a number "30", when we print its value it will return an index value that is equal to 3.

Answer:

2

Explanation:

if you’re using aptana to edit an html file, the easiest way to test it is to group of answer choices click on the run button in aptana’s toolbar type it’s path and filename into your browser’s address bar use the browser’s open or open file command in the file menu find it in the windows explorer and double-click on it

Answers

If you're using Aptana to edit an HTML file, the easiest way to test it is to click on the Run button in Aptana's toolbar.

Making web application development tools for use with various programming languages is the business of Aptana, Inc. Aptana Studio, Aptana Cloud, and Aptana Jaxer are the company's three primary products.

Studio Aptana. An open-source integrated development environment (IDE) for creating web apps is called Aptana Studio. It is based on Eclipse and supports JavaScript, HTML, DOM, and CSS with integrated documentation, code completion, outlining, and JavaScript debugging.

An open-source integrated development environment (IDE) for creating web apps is called Aptana Studio. It is based on Eclipse and supports JavaScript, HTML, DOM, and CSS with integrated documentation, code completion, outlining, and JavaScript debugging.

Aptana Studio now supports Ruby on Rails, PHP, Python, Perl, Adobe AIR, Apple iPhone, and Nokia WRT thanks to additional plugins (Web Runtime).

Learn more about toolbar:

https://brainly.com/question/25047693

#SPJ4

what could happen if I break copyright law in the future​

Answers

um i’m pretty sure you could go to jail and you would have to pay fines
youd pay fine. amount depends on the situation. you could also potentially face time in prison

in windows 8, which tool enables you to set up hard drives, manage devices, test system performance, and much more?

Answers

In Windows 8, Administrative Tools enable the users to perform many tasks including set up hard drives, manage devices and test system performance.

Administrative Tools in Windows are system management tools and applications to configure and troubleshoot important settings of operating systems. In Windows 8, they are by default hidden from the Start screen. Through the Control Panel, they can be accessed.

A few key Administrative Tools in Windows 8 include Computer Management, Defragment and Optimize Drives, Disk Cleanup, Registry Editor, Services, System Information, Task Scheduler, Windows Memory Diagnostic.

The tools offer different services in order to make a better user experience of using Windows 8.

For example, hard drive configuration and various devices management are performed by Computer Management Tool; system performance is monitored by Performance Monitor; Resource Monitor provides details about disk, memory, CPU, and network activity by individual processes; and Memory Diagnostics Tool is used to identify defects in computer memory etc. etc.

You can learn more about windows tools at

https://brainly.com/question/14720056

#SPJ4

criminals access someone’s computer and encrypt the user’s personal files and data. the user is unable to access this data unless they pay the criminals to decrypt the files. this practice is called …

Answers

"Criminals access someone’s computer and encrypt the user’s personal data and file. The user is unable to access this data and file unless they pay the criminals to decrypt the files. This practice is called" Ransomware .

Ransomware is a practice that is mostly used by ha-cker or criminals to access someone’s computer and encrypt the personal data on that computer. The user cannot decrypt the data until he pays those criminals.

In the world, cybersecurity is one of the major concerns not only for organizations but also individuals to protect their identity and data online. However, ha-ckers and criminals try to breach the security and access the system. They have different purposes or goals to access the system and steal the data. Mostly, these criminals encrypt the user’s data and ask money against decryption of that data. This practice is called ransomware.

Ransomware is an evolving form of malware. In this form, the ha-ckers or criminals, mostly threaten the owner of the system to publicize the data, in case of not paying the amount that they are asking for. Some ransomware destroy the data, while some lock the data ( encrypt the data) and ask for money to unlock it ( decrypt the data).

You can learn more about ransomware at

https://brainly.com/question/27312662

#SPJ4

10
Which key will erase text to the left of the cursor?
(1 Point)
Esc
Delete
Spacebar
Backspace
11​

Answers

Backspace is the answer

Answer:

Backspace

Explanation:

Please please help...what kind of device is this?​

Answers

Answer:

A hard drive disk for computer storage!

Explanation:

What are two possible challenges of online collaboration?

Answers

Answer:

A and B

Explanation:

A: In real life, you are always in the same time zone. Working across the internet, however, you are not. (Correct)

B: It's hard for people to understand what you mean, because they can't see body language. (Correct)

C: This could still happen in real life (Incorrect)

D: This is an opinion. (Incorrect)

Adam has created a document for publishing and needs to ensure that no changes can be made. He has accessed the
Developer tab and is using the Restrict Editing task pane. Which option should Adam choose?

Formatting Restrictions

Editing Restrictions

Start Enforcement

Track Changes

Answers

Answer:

formatting restricions

Explanation:

i took the test

Answer:

B) Editing Restrictions

Explanation:

By enabling this and leaving it as the default setting, the document is now read only and cannot be edited.

Which of these plays an important role in keeping attack traffic off your systems and helps to protect users? check all that apply

Answers

Answer:

Antivirus software

Antimalaware measures

The things which play an important role in keeping attack traffic off your systems and helping to protect users are antimalware measures and Antivirus software. The correct options are a and b.

What are antimalware measures and antivirus software?

Antimalware can assist in the prevention of malware assaults by checking all incoming data and preventing malware from being installed and infecting a computer.

When the operating system is unable to communicate with a mouse, the solution is to update the mouse device driver. This is because the mouse driver is frequently and always required to assist the motherboard in interacting with the device.

It is also a software that works between the Operating System and the Mouse because it can effectively and efficiently translate the signals to the motherboard appropriately or ways, which is why Microsoft's generic driver is used.

Therefore, the correct options are a and b.

To learn more about antimalware measures, refer to the link:

https://brainly.com/question/27994271

#SPJ2

The question is incomplete. Your most probably complete question is given below:

Antimalware measures

Antivirus software

Digital attack surfaces

cybersecurity

Is anyone else excited for sephiroth (I think I spelt it wrong) in smash. And if you arn't are you excited for christmas

Answers

Answer: idek what that is but okay ;v;

Answer:

his ultimate is fire

Explanation:

What is best for a busy student to do for better results in school?

increase extracurricular activities
transfer to a new school
manage time and stress
manage and budget money

Answers

Answer:

Manage time and stress

Explanation:

This is obvious

Answer:

manage time and stress

Explanation:

the person above or below me was correct.

Automatic red-eye reduction settings work best on which type of flash?
A.
high-Speed Sync
B.
integrated
C.
external
D.
TTL

Answers

Answer:

c

Explanation:

Which of these features is an orientation feature?
A.
letting users know where they are
B.
letting users know how to get to the next node
C.
letting users know where all the hyperlinks are
D.
letting users know how far they are from a node
E.
letting users know how far from the homepage they are

Answers

Answer:

e

Explanation:

Answer:

letting users know how far from the homepage they are

Explanation:

The quick access toolbar can be customized, but the ribbon can not be customized. True or false?.

Answers

Answer:

False

Explanation:

What is the additional space complexity of removing an element at the back of a queue with n elements and returning the queue with all other elements in their original order?.

Answers

Question: What is the additional space complexity of removing an element at the back of a queue with n elements and returning the queue with all other elements in their original order?

Answer: O(1)

Which type of device uses pixels?

A.
driver

B.
motherboard

C.
monitor

D.
mouse

Answers

Answer:

C - Monitor

Explanation:

Pixels are used to display imagery on the monitor.

Which file is usually the first file to be displayed when you navigate to a website?

A. Starter.html
B. Home.html
C.index.html
D. Template.html

Answers

Home. HTML is the first file to be displayed

let's now extend our build system to handle task dependencies. suppose we have the following tasks: cook

Answers

The ways you can define task dependencies are:

By studying how the tasks depend on each other.Categorizing dependencies into 4 types.

These four types into which a dependency is categorized are known as:

Finish to Start, Finish to Finish, Start to Start,  Start to Finish

What are Task Dependencies?

This refers to the order in which tasks must be performed and is the relationship that a task or milestone depends on other tasks to be performed (completely or partially) before it can be performed.

Hence, we can see that The ways you can define task dependencies are:

By studying how the tasks depend on each other.Categorizing dependencies into 4 types.

These four types into which a dependency is categorized are known as:

Finish to Start, Finish to Finish, Start to Start,  Start to Finish

Read more about task dependencies here:

https://brainly.com/question/14337598

#SPJ1

which field data type would you use if youd like to store videos in that field?

A. text

B. memo

C.boolean

D. binary object

E. null​

Answers

Answer:

D - Bianary Object

Explanation:

A binary large object is a collection of binary data stored as a single entity. Blobs are typically images, audio or other multimedia objects, though sometimes binary executable code is stored as a blob. They can exist as persistent values inside some databases or version control system, or exist at runtime as program variables in some programming. - Wikipedia

Why do numA and numB have the same scope in the subtract function?

def subtract(numA, numB):
return numA - numB

def divide(numC, numD):
return numC / numD

answer = subtract(24,6)
print (answer)
____________________
CHOICES
Only the subtract function can use or change the values of numA and numB.
numA and numB are both numeric.
numA and numB are similar names.
numA is passed the value 24 and numB is passed the value 6.

Answers

Answer:

Only the subtract function can use or change the values of numA and numB.

Explanation:

'scope' is about the parts of your program where a variable "exists", ie., can be used.

The other statements are factually true, but do not apply to the question.

Only the subtract function can use or change the values of numA and numB. So, the correct option is A.

What is Substract function?

In subtraction, the minuend is the primary number (from which a number must be subtracted) and the subtrahend is the second number (the number which is to be subtracted). The difference is the resultant number. In mathematics, the "minus" (-) operator is positioned in between the minuend and the subtrahend.

Use the minus symbol to carry out a basic subtraction operation (-). This is the simplest subtraction formula in Excel: =number1-number2. For instance, to subtract 10 from 100, write the equation below, which gives the answer of 90: =100-10. The values of numA and numB can only be used or modified using the subtract function.

Therefore, the correct option is A.

Learn more about Subtraction, here:

https://brainly.com/question/2346316

#SPJ2

What is the first step in creating a maintenance schedule?


log the maintenance completed

read the manuals

inventory equipment

develop a reminder system

Answers

The first step in creating a maintenance schedule is: C. inventory equipment.

What is SDLC?

SDLC is an abbreviation for system development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality systems, processes and resources, so as to provide specific services to end users.

The phases of SDLC.

In Computer technology, there are seven (7) phases involved in the development of a system and these include the following;

PlanningAnalysisDesignDevelopment (coding)TestingDeploymentMaintenance

In Computer technology, the first step in creating a maintenance schedule is to create a list of inventory equipment based on the system development requirements.

Read more on system development here: brainly.com/question/7112675

#SPJ1

Answer:

What is the first step in creating a maintenance schedule?

(B) Inventory Equipment

Explanation:

List any two features of this computer
h. Who invented Electronic Discrete Variable Automatic Computer? ​

Answers

Answer:

John Mauchy 1. designed to be a stored-program computer 2. it was binary rather than decimal

Possible pathways for acquiring information support and services training now include

A. internships


B. part-time jobs


C. participation in a career and technical student organization (CTSO), such as the Technology Student Association (TSA)


D. all of the above

Answers

Possible pathways for acquiring information support and services training now include: C. participation in a career and technical student organization (CTSO), such as the Technology Student Association (TSA).

What is CTSO?

CTSO is an abbreviation for career and technical student organization and it can be defined as a collection of vocational and nonprofit organizations that are primarily established in high schools, colleges, and career technology centers, so as to enable participants such as students to develop and acquire leadership, information support, and teamwork skills.

In this context, we can reasonably infer and logically deduce that participation in a career and technical student organization (CTSO), such as the Technology Student Association (TSA) are possible pathways for acquiring information support and services training.

Read more on career and technical student organization here: https://brainly.com/question/17263803

#SPJ1

Thomas would like to know when is the best time of the season to plant his tomato seeds. Which type of informational reference should he use

Answers

In this question, the options are missing. Here is the complete question:

Thomas would like to know when is the best time of the season to plant his tomato seeds. Which type of informational reference should he use?

A. Encyclopedia

B. Atlas

C. Almanac

D. Any of these

The correct answer is Almanac

Explanation:

Knowing the season or month to plant specific seeds is a relevant factor that can determine whether a plant grows and thrives. Because of this Thomas needs accurate and complete information about the best time of the year to plant tomatoes. This information can be found in an almanac because almanacs include planting dates for different plants as well as weather forecasts and other important events that can affect agriculture. Moreover, this informational reference provides information about the current year, which makes it to be updated in the topics it covers.

Answer:

Almanac

Explanation:

edge 2021

while viewing the status of interfaces on a cisco switch, you see an abnormally large number of crc errors on one interface. this interface is connected to a user's workstation that is located in a cubicle on the second floor. what could cause this to happen?

Answers

Answer: CRC Can be caused by faulty wires, cat 6 or 7 , or faulty network topography.

Explanation: Switch port could be bad try to switch out the cable to another port on the switch or patch panel . Check the UPSTREAM NETWORK DEVICE Make sure you make or bring enough patch cables to test as some of the wirings may have to be replaced.

Other Questions
What is the most likely reason that early West Africans wanted to please nature spirits?to protect their ancestors from evilto help them have success in battleto increase their chances of becoming wealthyto ensure their crops would get enough water the sum of three numbers is 87. the second number is 2 times the third. the first number is 5 less than the third. what are the numbers? in which of these processes is a young plant lowered towards the ground and covered by moist soil forming a layer?a, grafting.b, layering.c, cutting. d, tissue culture. If you deposit $7500 into an account paying 7% annual interest compounded monthly, howmuch money will be in the account after 9 years? Complete the pattern in the multiplication table What is the equation, in point-slope form, for a line that goes through (2, -6) and hasa slope of 3/5A. y - 6 = 3/5 (x + 2)B. y - 2 = 3/5 (x + 6)C. y+2 = 3/5 (x 6)D. y+6= 3/5 (x - 2) . Among the following colors in a rainbow, which has the least energy? Let x= t+2 and y= t Write an equation for y in terms of only X please pleas help me!!Solve the system using elimination. 6x + 14y = 326x - 14y = 4The solution is ___ ( simplify your answer. Type an ordered pair.) describe Newton's law of gravitation and its application? write short note on any two method of mining Which expression is equivalent to 2(14x-3y+28x+12.2-5y-17.5)?A.84x-16y-10.6B.28x-6y-10.6C.42x-8y-5.3D.84x-16y-5.3 I need help!!Describe the graph of the following function, including where it is shaded? My test ends in 9 minutes Consider Antigone's equating "final Justice" with the "immortal unrecorded laws ofGod." How might a kind of "Euthyphro question" be applied to that idea, and howmight Socrates react? Luis rides his bicycle 3/4 miles in 15 minutes along the bike trial. Assuming he rides at a constant rate, what is his speed? in miles per hour? A poll was taken to total the candy collected by a few students who went trick or treating on Halloween. Determine the ratio that compares the number ofcandy bars to the total pieces of candy.Halloween Number ofCandy PiecesLollipops 10Gumballs 15Candy Bars5Chocolate 101:61:501:40 1:8 In a solution of a carbonated beverage, the water is the _______. A. solute B. solvent C. saturated D. precipitate HELP NOW 50 POINTS!Given the system below, SELECT all terms that will beeliminated by adding the equations together.-X + y = -12x - y = 0-x2xy-y-10 Identifying majors with specific language and mathematics requirements using the degree search selection filters help you solve what type of business problem?. Find the exact length of the third side.6048Im stuck in this helppp