Answer:
Here is the JAVA program:
import java.util.Random; //to generate random numbers
import java.util.Scanner; //to accept input from user
public class Main { //class name
public static void main(String[] args) { //start of main method
int score = 0; //to store the number of correct answers
Random rand = new Random(); //generates random numbers
int answer; //to store the answers given by student
do { //to keep asking addition questions
int number1 = rand.nextInt(101); //generate random number from 0 to 100 for operand 1
int number2 = rand.nextInt(101); //generate random number from 0 to 100 for operand 2
Scanner input = new Scanner(System.in); //to read input from user
System.out.print("What is " + number1 + " + " + number2 + " ? "); //asks addition question
answer = input.nextInt(); //reads the answer from user(student)
if ((number1 + number2) == answer) //if user answer of addition of two numbers is correct
score = score + 1; //adds 1 to the score each time the answer to the addition question is correct
}while(answer<=100); //keeps asking question until the answer number exceeds 100
System.out.println("Total score is: " + score); }}//displays the total score of student
Explanation:
The above program basically asks addition questions from user. Each addition question has two random numbers and the answer is given by user. At each right answer, the variable score is incremented by 1 in order to store the number of correct answers by user. If the answer to any addition question exceeds 100 then the loop breaks and program stops and the questions answered before that question is considered only.
Another way to do this is to ask 10 addition questions by using random numbers as operands and only that answer is considered which does not exceed 100. Next the if condition checks if the answer to the addition is correct. If this condition evaluates to true then the if condition inside this if condition checks that the value of answer does not exceed 100. If this inner if condition evaluate to true only then the score is incremented to 1 otherwise not and the program displays a message. Here is that program:
import java.util.Random;
import java.util.Scanner;
public class Main {
public static void main(String[] args) {
int score = 0;
Random rand = new Random();
for (int i = 0; i < 11; i++) {
int number1 = rand.nextInt(101);
int number2 = rand.nextInt(101);
Scanner input = new Scanner(System.in);
System.out.print("What is " + number1 + " + " + number2 + " ? ");
int answer = input.nextInt();
if ((number1 + number2) == answer)
{ if (answer<=100)
{ score = score + 1;}
else
{System.out.print("Answer should not be greater than 100 \n");} } }
System.out.println("Total score is: " + score); }}
The screenshot of both program outputs is attached.
Answer:how the hell do u even do that the guy made one kudos to him
Explanation:I didn’t realize I was writing this here I meant to my friend
Kris Allen runs a pet daycare center. She needs to keep track of contact information for her customers, their animals, the services provided (such as walking and grooming), and the staff who are assigned to care for them. She also must send out invoices for payment each month. What features of spreadsheets and/or database software might she use to facilitate her business
for easy data management i recommend SQL
The features of spreadsheets and/or database software might she use to facilitate her business are:
Rows and columns in spreadsheet's can make her information to be neatly organized.The use of Formulas and functions.What is Spreadsheet?A spreadsheet is known to be a kind of computer application that is often used for computation, organization, and others.
Note that The features of spreadsheets and/or database software might she use to facilitate her business are:
Rows and columns in spreadsheet's can make her information to be neatly organized.The use of Formulas and functions.Data filteringAccounting.Analytics, etc.Learn more about spreadsheets from
https://brainly.com/question/27119344?answeringSource=feedPublic%2FhomePage%2F20
#SPJ2
Match each item with a statement below.â
a. âAn address type used in IPv6 to allow a one-to-many relationship between source and destination.
b. âThe bounds of a network that defines which devices must receive a packet thatâs broadcast by any other device.
c. âA method of IP addressing in which the network and host IDs are determined by a prefix number that specifies how many bits of the IP address are network bits.
d. âAnd auto configure IPv6 host address that uses the MAC address of the host plus an additional 16 bits.
e. âAn automatic tunneling protocol used to transmit IPv6 packets between dual IP layer hosts across an IPv4 network.
f. âA value used to express how many bits of an IP address are network ID bits.
g. âAn address that always refers to the local computer.
h. âA value assigned to the gateway based on the speed of the interface used to access the gateway.
i. âA network communication in which a packet is addressed so that more than one destination can receive it
j. âAn automatic IPv6-over-IPv4 tunneling protocol that solves the problem of 6to4's requirement of a public IPv4 address and the inability to traverse NAT routers
a. âanycast addresses
b. âbroadcast domain
c. âCIDR
d. âEUI-64
e. âISATAP f. âIP prefix
g. âloopback address
h. âmetric
i. âmulticasting
j. Teredo
Answer:
a. Anycast Addresses
b. Broadcast domain
c. Classless Interdomain Routing (CIDR)
d. Extended Unique Identifier (EUI-64) interface ID
e. Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
f. IP prefix
g. Loopback Address
h. Metric
i. Multicasting
j. Teredo
Explanation:
a. Anycast Addresses: An address type used in IPv6 to allow a one-to-many relationship between source and destination.
b. Broadcast domain: The bounds of a network that defines which devices must receive a packet that's broadcast by any other device.
c. Classless Interdomain Routing (CIDR): A method of IP addressing in which the network and host IDs are determined by a prefix number that specifies how many bits of the IP address are network bits.
d. Extended Unique Identifier (EUI-64) interface ID: An auto configure IPv6 host address that uses the MAC address of the host plus an additional 16 bits.
e. Intra-Site Automatic Tunnel Addressing Protocol (ISATAP): An automatic tunneling protocol used to transmit IPv6 packets between dual IP layer hosts across an IPv4 network.
f. IP prefix: A value used to express how many bits of an IP address are network ID bits.
g. Loopback Address: An address that always refers to the local computer. The loop address is primarily 127.0.01.
h. Metric: A value assigned to the gateway based on the speed of the interface used to access the gateway.
i. Multicasting: A network communication in which a packet is addressed so that more than one destination can receive it
j. Teredo: An automatic IPv6-over-IPv4 tunneling protocol that solves the problem of 6to4's requirement of a public IPv4 address and the inability to traverse NAT routers.
What is a spreadsheet macro?
A) A small program which performs several steps, which can be recorded and activated using a hot key combination.
B) A tool used to create charts.
C) A feature inside excel that makes your work look better.
D) A formula to complete calculations.
Answer:
Macros are code that automate work in a program—they let you add your own tiny features and enhancements to help you accomplish exactly what you need to do, quickly with just a click of a button.
Explanation:
Momentous events in Philippine history where ICT played a huge role in making it a success?
Answer:
I hope this answer is correct
Explanation:
MANILA, Philippines – Sixteen years ago, Filipinos gathered at the historic thoroughfare EDSA, where freedom was once won against a dictator in 1986.
MANILA, Philippines – Sixteen years ago, Filipinos gathered at the historic thoroughfare EDSA, where freedom was once won against a dictator in 1986.EDSA People Power II, as it came to be known, was a series of protests held from January 16 to 20, 2001, against former president Joseph Estrada who was then facing plunder charges. The protests eventually triggered Estrada’s downfall – and paved the way for Gloria Macapagal-Arroyo, his vice president, to enter the spotlight in the political scene.
MANILA, Philippines – Sixteen years ago, Filipinos gathered at the historic thoroughfare EDSA, where freedom was once won against a dictator in 1986.EDSA People Power II, as it came to be known, was a series of protests held from January 16 to 20, 2001, against former president Joseph Estrada who was then facing plunder charges. The protests eventually triggered Estrada’s downfall – and paved the way for Gloria Macapagal-Arroyo, his vice president, to enter the spotlight in the political scene.But Arroyo would later face her own share of troubles during her administration. Both former presidents seemed to follow the same track in politics: they were both vice presidents before assuming the highest seat of the land, and both have been accused of criminal offenses. Despite these, Estrada and Arroyo have managed to retain positions in government today.
4. How many times will the print statement be executed within the following nested for loops? Briefly explain how or show the math to calculate that number of iterations.
for (int h = 1; h <= 12; h++) {
for (int m = 0; m <= 59; m++) {
for (int s = 0; s <= 59; s++) {
System.out.printf(“%d:%02d:%02d%n”, h, m, s);
}
}
}
Print statements are used to display outputs
The number of times the nested loop will be executed is 43200
What are nested for loops?Nested for loops are loops that are placed within another loop or loops
From the statement, we have the following loop conditions:
h = 1; h <= 12, m = 0; m <= 59 and s = 0; s <= 59
The above means that:
h = 12 --- the outer loop will be executed 12 timesm = 60 --- the middle loop will be executed 60 timess = 60 --- the inner loop will be executed 60 timesSo, the number of times the nested loop will be executed is:
[tex]Count = 12*60 *60[/tex]
[tex]Count = 43200[/tex]
Hence, the number of times the nested loop will be executed is 43200
Read more about loops at:
https://brainly.com/question/14284157
What is 3+5?*
(Hint: is it not 8)
Such a confusing question:)
Explanation:
mark me brainliest
Identify and critically discuss the economic system you would prefer your business to operate in. Justify your choice.
The economic system you would prefer your business to operate in is free market system.
What type of the free market economic system?The economic system that I like is the free market system. It is also called capitalism.
The reason why I choose this is because in a free market, competition is the factor that often shows or dictates how goods and services tends to be allocated. Business in this market are often conducted with little limited government involvement in it.
Learn more about free market system from
https://brainly.com/question/3369578
Which of the following is a true statement?
New employees and/or clients are not concerned with the details of an email; they focus on the deal.
Business emails can convey a negative tone as long as it is supported by a valid reason and sufficient data.
Business emails should always be written using a professional tone.
It is acceptable if proper punctuation, spelling, and capitalization are not used all the time.
Answer:
4
Explanation:
it's unacceptable, proper punctuation, spelling and capitalization shud be used where possible
Use the drop-down menu to identify which command is used to do the activities.
Saving updates on a workbook:
Saving a workbook on OneDrive:
Changing the file name of an existing workbook:
Saving an existing workbook in a different location:
Assigning an initial location for the workbook to be saved:
Answer:
1. Both
2. Save As
3. Save As
4. Save As
5. Both
Explanation:
got the question right
The value you choose—typically the display text—will be saved as the default “Dropdown list” data-type. Instead of saving the text, the “Dropdown list with published keys” instead saves the Revalue ID (from the database).
What is use of a drop-down menu to identify a command?A drop-down menu, also known as a list of options, appears when a button or a piece of text is clicked. Users can decide a value from a list by selecting it from a graphical representation of this method.
People can select an item from a list you generate using drop-down menus. In a new worksheet, type the selections you want to appear in your drop-down list. Your list items should ideally be in an Excel table.
A closed-ended inquiry known as a dropdown allows respondents to select one response option from a set of options displayed in a dropdown menu.
Therefore, 1. Both 2. Save As 3. Save As 4. Save As 5. Both.
Learn more about drop-down here:
https://brainly.com/question/4379717
#SPJ2
1.Give single word
a. A computer never gets tired or bored while working for a long time ..........
b. A computer doesn't make any mistake ..........
c. A computer can perform billions of calculations in a second .........
d. A computer can perferm several tasks such as drawing pictures,playing games,etc.......
Answer:
A. Versatile
B. Accuracy
C. High speed
D. Animation.
Should spreadsheets be used to track time worked at a job?
YES
NO
Answer:
Yes
Explanation:
Spreadsheets should be used to track time worked at a job because it would make it easier to use and see rather than another platform.
HTML is at the core of every Web page, regardless the complexity of a site or number of technologies involved.
1. True
2. False
Answer:
1
Explanation:
That is true. Every website, no matter how complex, breaks down to basic HTML code and structure.
Three-dimensional models are constructed using two-
dimensional profiles.
True or false
Answer:
False.
It would be true for pyramids, but not true for other shapes, like spheres and cubes.
If you only use part of a quotation, it is not necessary to include a citation.
Answer:
i believe this is false
explanation:
Hello World.
⇒ What is the function of for loops in Python?
Answer:
The for loop in Python is used to iterate over a sequence (list, tuple, string) or other iterable objects. Iterating over a sequence is called traversal.
The for loop in Python is used to iterate over a sequence (list, tuple, string) or other iterable objects. Iterating over a sequence is called traversal.
Explanation:
# Brainliest Bunch
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key K, then Bob could impersonate Carol to Alicia (actually any of three can impersonate the other to the third). Suppose instead that each had their own secret key, so Alice uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his/her identity, responds to a challenge with a function of his/her secret key and the challenge. Is this more secure than having them all use the same secret key K? (Hint: what does Alice need to know in order to verify Carol’s answer to Alice’s challenge?)
Answer:
No. This is not more secure.
Explanation:
this is not more secure than having all of Carol, bob and Alice having the same key.
alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.
any of these 3 would have to know someone else's secret key to verify answers to any challenge.
the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.
Alejandro wants to post an animation on his social media page that shows a series of slightly different images displayed in sequence. What type of animation should he select?
A.) Animated gif
B.) HTML 5
C.) Adobe Flash
D.) Adobe animate cc
Answer:
Adobe Flash
Explanation:
From the list of given options, Adobe Flash answers the question.
Adobe Flash are basically multimedia animations that are created to include numerous images which are displayed in sequence.
Other options such as Adobe animation cc is a software used to create flash animations, html5 is a web language, animated GIF are short animations.
The type of animation he should select is A.) Animated gif
Animated gif are picture which are in Graphic interchange format (GIF) .
Animated gif are very easy to download because they download quickly.
Animated gif are picture that always move non stop when displayed on a computer screen or other device as the picture changes from one picture to another picture.
They can always be found on the internet and they are mostly used as an advertisement pictures that is embedded on web pages which help to showcase a company product.
Inconclusion The type of animation he should select is A.) Animated gif.
Learn more about Animated gif here:
https://brainly.com/question/15057611
When an application checks for malware, it compares the contents of every file it looks at to this database of definitions and if it finds a match, it flags the file as potentially being infected.
1. True
2. False
When an application checks for malware, it compares the contents of every file it looks at to this database of definitions and if it finds a match, it flags the file as potentially being infected is a true statement.
What does anti-malware software look for?A lot of programs are known to scan for malware through the use of a database that contains some known malware definitions
These definitions are used to tell what the malware does and how to know it. If the anti-malware program can be able to detects a file that matches the definition, it will then flag it as potential virus.
Learn more about application from
https://brainly.com/question/1538272
Which is the "Network Effect?"
Answer:
The network effect refers to the concept that the value of a product or service increases when the number of people who use that product or service increases.
Explanation:
Hope this helps !!
Which should be your first choice for the most efficient and successful job search method?
visiting a career center
performing an online search
networking person-to-person
checking newspapers and other publications
Answer:
C
Explanation: Source: trust me bro
Answer:
C
Explanation: Edge 2022
One of the leading causes of serious injuries and deaths in this country is single-vehicle crashes into roadside obstacles and hazards.
True
False
Answer:
True
Explanation:
Just took the quiz on edginuity
Good luck
The ideal gas law allows the calculation of volume of a gas given the pressure(P), amount of the gas (n), and the temperature (T). The equation is:
V = nRT / P
Since we only have used integer arithmetic, all numbers will be integer values with no decimal points. The constant R is 8.314 and will be specified as (8314/1000). This gives the same result.
Required:
Implement the ideal gas law program where the user is prompted for and enters values for n, T, and P, and V is calculated. Be careful to implement an accurate version of this program. Your program should include a proper and useful prompt for input, and print the results in a meaningful manner.
Answer:
Written in Python
P = float(input("Pressure: "))
T = float(input("Temperature: "))
n = float(input("Amount of Gas: "))
R = 8.314
V = (n * R * T)/P
print("Volume: "+str(round(V,2)))
Explanation:
The next 3 lines prompts user for inputs of Pressure, Temperature, Amount of Gas
P = float(input("Pressure: "))
T = float(input("Temperature: "))
n = float(input("Amount of Gas: "))
This line initializes constant R
R = 8.314
This line calculates volume
V = (n * R * T)/P
This line prints volume, rounded up to 2 decimal places
print("Volume: "+str(round(V,2)))
How does Accenture work to build trust in Artificial Intelligence (AI)?
Accenture work to build trust in Artificial Intelligence (AI) through investing in differentiated intellectual property.
What is a differentiated intellectual property?Intellectual property serves as a creations of the mind as well as inventions that is bee used in commerce.
With the creation of this differentiated intellectual property, it help the Accenture to be able to establish trust because there is a law that protect any intellectual property in the the country.
Read more on intellectual property here: https://brainly.com/question/1078532
#SPJ2
what are the five generations of computer software
Answer:
1st gen: Vacuum Tubes(1940–1956)
2nd gen: Transistors(1956–1963)
3rd gen: Integrated Circuits: (1964–1971)
4th gen: Microprocessors (1971–PRESENT)
5th gen: Artificial Intelligence (present)
Explanation:
Submit your 300- word essay that: 1) identifies a problem in your community and works through problem solving steps to provide a solution, and 2) analyzes five conflicts through the conflict resolution approaches and explains an appropriate resolution for each conflict.
Note the above prompt is about a descriptive essay. See the sample essay below.
Descriptive Essay about a problem in my community and the Solution to the SameWaste management is an issue that affects every community around the world. It is a problem that has far-reaching consequences on human health and the environment. In my community, waste management is an issue that requires immediate attention. The problem stems from a lack of awareness, inadequate infrastructure, and insufficient regulatory measures.
To address this problem, we can follow a problem-solving process.
The first step would be to define the problem, which is waste management. This would involve understanding the causes and effects of the problem.
The second step would be to gather data on the problem. This could be done through surveys, interviews, and observations.
The third step would be to analyze the data collected and identify the root causes of the problem. In our case, the root causes could be lack of awareness, inadequate infrastructure, and insufficient regulatory measures.
The fourth step would be to brainstorm solutions to the problem. This could be done through workshops, focus groups, and meetings. Some possible solutions could be to increase public awareness through education campaigns, improve waste collection and disposal infrastructure, and enforce stricter regulations on waste disposal.
The fifth and final step would be to implement and evaluate the solutions. This would involve monitoring and assessing the effectiveness of the solutions and making adjustments as necessary.
Conflicts are inevitable in any community, and it is essential to have effective conflict resolution approaches to ensure that these conflicts are resolved in a fair and equitable manner. The five conflict resolution approaches are negotiation, mediation, arbitration, litigation, and avoidance.
Negotiation is a conflict resolution approach that involves parties coming to an agreement through discussion and compromise. This approach would be appropriate for conflicts that are relatively minor and do not involve legal or ethical issues.
Mediation is a conflict resolution approach that involves a neutral third party facilitating a discussion between the conflicting parties to come to an agreement. This approach would be appropriate for conflicts that involve communication breakdowns or misunderstandings.
Arbitration is a conflict resolution approach that involves a third party making a binding decision on the conflict. This approach would be appropriate for conflicts that involve legal issues.
Litigation is a conflict resolution approach that involves taking the conflict to court to have a judge make a binding decision. This approach would be appropriate for conflicts that involve legal or ethical issues.
Avoidance is a conflict resolution approach that involves ignoring or avoiding the conflict altogether. This approach is generally not recommended as it does not resolve the conflict and can lead to further problems in the future.
In conclusion, waste management is a problem that requires a concerted effort from everyone in the community to address. Through problem-solving steps, we can identify the root causes of the problem and come up with effective solutions. Note as well that, having effective conflict resolution approaches is essential in ensuring that conflicts in the community are resolved in a fair and equitable manner. By following these approaches, we can work towards creating a more sustainable and harmonious community.
Learn more about Descriptive Essay at:
https://brainly.com/question/25505941
#SPJ1
What will be displayed as a result of executing the following code?
int x = 6;
String msg = "I am enjoying this class.";
String msg1 = msg.toUpperCase();
String msg2 = msg.toLowerCase();
char ltr = msg.charAt(x);
int strSize = msg.length();
System.out.println(msg);
System.out.println(msg1);
System.out.println(msg2);
System.out.println("Character at index x = " +
ltr);
System.out.println("msg has " + strSize + "characters.");
A) I am enjoying this class. I AM ENJOYING THIS CLASS. i am enjoying this class. Character at index x = e msg has 24 characters.
B) I am enjoying this class. I AM ENJOYING THIS CLASS. i am enjoying this class. Character at index x = e msg has 25 characters.
C) I am enjoying this class. I AM ENJOYING THIS CLASS. i am enjoying this class. Character at index x = n msg has 24 characters.
D) I am enjoying this class. I AM ENJOYING THIS CLASS. i am enjoying this class. Character at index x = n
msg has 25characters.
Answer:
d
Explanation:
You are a Network administrator for a company whose IP address is 199.199.10.0/24. Your company has two departments. Research needs 13 hosts and Marketing needs 31 hosts. Using VLSM; what is the network address of the second subnet?
Answer:
Explanation:
VLSM is Variable Fixed Length Subnet Mask which creates subnets with varying sizes with a variable number of hosts.
Arrange the different subnets with descending number of hosts required. So the first subnet will be for Marketing and the second will be for Research. The second subnet will have the second higher IP available which is 199.199.10.0/26. It has 64 IP addresses that can be assigned to 13 hosts required by Research.
Benchmark test compare similar systems performing in which tasks
A) similar tasks
B) different tasks
C) related tasks
D)identical tasks
Benchmark test compare similar systems performing in identical tasks.
What is Benchmark in the act of Performance Testing?A Benchmark Testing is known to be a kind of metric or one that is used as a kind of point of reference against a software products or services and it is one that can be compared to know the quality feature.
This kind of test is one where there is a set standard that aid one in knowing the quality of software product or service. One can benchmark a identical product to know its quality.
Learn more about Benchmark test from
https://brainly.com/question/226804
A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ . Group of answer choices analysis integrity masquerade encryption
Your boss has asked you to create a program that calculates the total cost of an item
after a discount and sales tax have been applied. You have been testing the program
using a cost of $10.00, a discount of 50%, and 10% sales tax. You know the answer
should be $5.50 but the program returns $16.50. What type of error is most likely
causing the problem?
Answer:
Have you tried debugging the text? It shows the line by line process of the final answer