(a) Rewrite the following using if else statement:
int x;
String s=(x%3=0)? “Divisible by 3" : "Not divisible by 3";
System.out.println(s);​

Answers

Answer 1

Answer:

int x;

String s;

if ((x%3) == 0) {

   s = "Divisible by 3";

} else {

  s = "Not divisible by 3";

}

System.out.println(s);​

Explanation:

A : B ? C generally translates to if (A) { B } else { C }.

Note the == to compare to 0. The single = in the original expression is a mistake.


Related Questions

Programming languages create codes that represent binary numbers so that programmers can write in a language closer to natural speech.

Answers

Answer:

True

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

This ultimately implies that, programming languages are designed and developed for creating codes that represent binary numbers (0s and 1s), so that programmers or software developers can write in a language closer to natural speech i.e the human language.

With respect to using software to build a project network, the authors contention is that... Multiple choice question. Understanding the calculations used is vital to proper use. Software makes up for the need to understand the forward/backward pass calculations and is not necessary for a person to know the pass calculations.

Answers

Answer:

They should have a common start and end node, numbering activity aides clarity, and no "if-then" statements

When constructing a project network for a project with 25-100 tasks, a common industry practice is to

utilize the "yellow sticky" approach

which computer is used in hospital for ultrasound?​

Answers

Answer:

Pentium Powered Computer

Explanation:

Pentium powered computer

A computer is an.............. device.​

Answers

Explanation:

A computer is an electronic device

Answer:

Computers are electronic devices that process information.

When media is used to communicate with a very large audience, it is referred to as media.

Answers

Answer:

mass media

Explanation:

Answer:Mass media communication

Explanation:

What is a single physical processor? plz help​

Answers

Answer:

A physical processor which is also referred to as a CPU, is a chip that is visible on a computer's circuit board.

Explanation:

Which formatting group would commonly be used for monetary figures?

number
general
accounting
currency

Answers

Answer:

currency.

Explanation:

A word processor can be defined as a software application or program designed to avail the end users the ability to type and format text documents for various purposes.

Some examples of word processors are Notepad, Microsoft Word, etc.

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

Formatting in Microsoft Word refers to the appearance of texts in a document.

Basically, to format a text typically involves performing tasks such as, bold, underline, italics, font-size, font-types, color, etc.

The commands to perform the above tasks are mainly found in the format menu of the Home tab.

In Microsoft Word, you can set the display format for date, percentage, number, and currency (monetary figures). Thus, this format styles define how these values are displayed in charts and tables.

In this context, the formatting group which is commonly used for monetary figures (numerical data) such as dollar, euro, yen, naira, etc., is called currency.

Answer:

I think the answer is D

Have a good day!

What contains programming statement written in VB?​

Answers

Answer:

A statement in Visual Basic is a complete instruction. It can contain keywords, operators, variables, constants, and expressions. Each statement belongs to one of the following three categories: Declaration statements, which name a variable, constant, or procedure and can also specify a data type.

While using a Web-based order form, an attacker enters an unusually large value in the Quantity field. The value she entered is so large that it exceeds the maximum value supported by the variable type used to store the quantity in the Web application. This causes the value of the quantity variable to wrap around to the minimum possible value, which is a negative number. As a result, the Web application processes the order as a return instead of a purchase, and the attacker's account is refunded a large sum of money. What type of attack has occurred in this scenario

Answers

Answer: integer overflow

Explanation:

The type of attack has occurred in this scenario is a integer overflow. An integer overflow occurs when there's an attempt by an arithmetic operation to create a numeric value which is outside the range which the given numbers are able to represent.

In this, the integer overflow occurs when the result of the integer operation cannot be able to fit in the allocated memory space which then brings about an unexpected result.

In order for two queries to be UNION-compatible, they must: Select one: A. both have the same number of lines in their SQL statements. B. both output compatible data types for each column and return the same number of rows. C. both return at least one row. D. both return exactly one row.

Answers

Answer: B. both output compatible data types for each column and return the same number of rows.

Explanation:

In order for two queries to be UNION-compatible, they must be both output compatible data types for each column and return the same number of rows.

It should be noted that two relations are union compatible when both relations have the same attributes and also the domain regarding the identical attributes are thesame.

The router is physically located in a server room that requires an ID card for access. You backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with the username admin and the password admin. You used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device

Answers

Answer: Use an SSH client to access the router configuration.

Change the default administrative username and password

Explanation:

Based on the information given, in order to increase the security of the device, it's vital to use an SSH client to access the router configuration. The SSH client refers to the program that helps in establishing an authenticated and secure SSH connections to the SSH servers. It's vital for operating network services securely over a network that's unsecured.

Also, the default administrative username and password should be changed to a more secure username and password which can't be easily known by a third party.

You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do

Answers

Answer:

Implement BitLocker with a TPM

Explanation:

In Computer science, a memory is a term used to describe the available space or an electronic device that is typically used for the storage of data or any computer related information such as images, videos, texts, music, codes and folders. Some examples of a storage device are hard disk drive, CD-ROM, flash drive, etc.

Basically, there are two (2) main types of memory;

A. Read only memory (ROM).

B. Random access memory (RAM).

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

In this scenario, if you want to prevent the laptops from booting unless a special USB drive is inserted; you should implement BitLocker with a trusted platform module (TPM) on Microsoft Windows.

Software that tries to monitor and track the way you use your computer.​

Answers

Explanation:

that's called a virus, and it can do much harm to your softwares

From a dictionary, the literal meaning of virus is "a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data." Therfore, the answer is clearly virus.

Hope this helps! Have a great day!

You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action to stop or prevent the attack, if possible. Which tool should you use

Answers

Answer:

Intrusion Prevention System (IPS)

Explanation:

Firewall can be defined as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Simply stated, a firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

A firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.

Basically, it is a network security device or security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer

Thus, the tool you should use is an intrusion prevention system (IPS).

In what way, if any, has community building changed in the age of digital media? People’s community building has not changed in the age of digital media. People are now more willing to share highly personal information with strangers. People are now far less interested in building community or connecting with others. People are now more interested in forming communities based on physical location.

Answers

Answer:

People are now more willing to share highly personal information with strangers. Match each type of digital health, wellness, and security with examples of potential violations.

Which of the following characterizes pooled interdependence? Multiple Choice Each member has a great deal of discretion in terms of what they do and with whom they interact while collaborating to accomplish the team’s work. Interaction in the team only occurs between members who perform tasks that are next to each other in a sequence. Members interact with a subset of other members to complete the team’s work. Group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output. Different tasks are done in a prescribed order, and the group is structured such that the members specialize in these tasks.

Answers

Answer:

Group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output.

Explanation:

A pooled interdependence arise or occurs when the members of a group are able to function with relative independence and then their combined output or level of productivity is used to significantly augment the group's overall performance.

A characteristic of pooled interdependence is that group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output.

How is IT used in entertainment to make cartoon movies

Answers

Answer:

Forensic animation is a branch of forensics in which animated recreation of incidents are created to aid investigators & help solve cases. Examples include the use of computer animation, stills, and other audio visual aids.

hope you will get this answer correct

The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as

Answers

Answer: transaction cost

Explanation:

Transaction costs refers to the expenses that are incurred when a good or service is bought or sold. Transaction cost is the labor that's required in bringing a product to the market.

Transaction cost is the costs that are incurred when a firm buys on the marketplace what it cannot make itself.

Transaction costs are the costs that are incurred which don’t accrue to the participant of the transaction.

discuss any five barries of integrating ict tools in education​

Answers

Answer:

lack of computer, lack of quality software, lack of time, lack of technical programs and lack of teachers

Selena owns a bakery. She wants to compare the number of pies, cookies, cakes, and brownies that she sells in one month. Which charts are appropriate for this task? Check all that apply.

Answers

Column, line, bar, and possibly pie.

Answer:

Column, Bar, And Pie

Explanation:

got it right

Angelina has added page numbers to her report, but all of the pages are labeled "Page 1” at the bottom. What caused this issue?
She typed “Page 1” in the footer.
She added a header instead of a footer.
She did not create a numbered list in her footer.
She forgot to click the Continue Numbering option.

Answers

Answer:

She typed "Page 1" in the footer.

Explanation:

This occured because the footer only repeats the same message across the footers unless you enable page numbering.

Hope this helps!

How is Ms word more suitable and easier for document designing?

Answers

Answer:

MS Word is a word processing application, that built with an excellent array of features that permit the editing of text documents, with fonts, margins, borders, and page layout properties. Tables, charts, word art, shapes and pictures can be easily added to enhance the appearance and professional look of documents, as well as being able to publish documents in Portable Document Format, PDF and other file formats

Using MS Word, users an create write contract documents, resume, write-ups, fliers, invitation cards, projects, and reports from several customizable templates available in the Online Templates option of creating New Documents

The application provides support and upgrade to users that enable them make the most use of their time by having the required text document creation features in one application

Explanation:

Can someone answer this, I'll mark u the brialintest

Answers

Answer:

d

Explanation:

Decimal equivalent of "D" = (D) 13 × 16^1

What is the primary difference, if any, between a web master and a web producer? While a web master maintains a company’s websites, the web producer maintains a company’s entire web-based system. While a web producer maintains a company’s websites, the web master maintains a company’s entire web-based system. While a web master maintains a company’s web presence, the web producer maintains all technology at a company. While a web producer maintains a company’s web presence, the web master maintains all technology at a company.

Answers

Answer:

While a web master maintains a company’s websites, the web producer maintains a company’s entire web-based system.

I'm assuming that's A

how do you underline the selected text?

Answers

Select the text that you want to underline. Tip: You can also use the keyboard shortcut Ctrl+D. Use the Underline style drop-down list to select an underline style. Use the Underline color drop-down list to change the color of the line.

hardware and software are........... to each other​

Answers

Answer:

Hardware and software are interconnected to each other​

Hope this is what you´re looking for!

A security operations team was alerted to abnormal DNS activity coming from a user's machine. The team performed a forensic investigation and discovered a host had been compromised. Malicious code was using DNS as a tunnel to extract data from the client machine, which had been leaked and transferred to an unsecure public Internet site. Which of the following BEST describes the attack?
A. Phishing
B. Pharming
C. Cache poisoning
D. Data exfiltration

Answers

Answer:

D. Data exfiltration

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, data exfiltration, etc.

The type of attack in this scenario is best described as data exfiltration.

Data exfiltration can be defined as a form of data security breach that typically involves an unauthorized transfer of data from a host computer by using a malware and a malicious code.

Hence, data exfiltration occurs when a malicious code uses a domain name server (DNS) as a tunnel to extract data from an end user's computer (client machine) and transferring it to an unsecure public Internet site.

List out differences in the ways global communities were formed before and after the advent of the internet and social media.

Answers

Answer:

is a remarkably complex technical system built on the creative contributions of scientists around the world from the 1950s to the present. Throughout its evolution, the Internet and other networks have been promoted by governments, researchers, educators, and individuals as tools for meeting a range of human needs. A combination of high-level policy and grassroots improvisation has produced social benefits including easier and more widespread access to computers and information; increased scientific collaboration; economic growth; the formation of virtual communities and an increased ability to maintain social ties over long distances; the democratization of content creation; and online political and social activism. The Internet’s rapid growth has also spawned technical crises, such as congestion and a scarcity of network addresses, and social dilemmas, including malicious and illegal activities and persistent digital divides based on income, location, age, gender, and education. Such problems continue to demand creative solutions from scientists, policy makers, and citizens.

Several general themes characterize the technical development of the Internet. First, from the 1950s to the present there has been a steady increase in the size of data networks and the variety of services they offer. Rapid growth and diversity have forced network designers to overcome incompatibilities between computer systems and components, manage data traffic to avoid congestion and chaos, and reach international agreement on technical standards. These challenges have led to fundamental advances in research areas such as operating systems and queuing theory. A second trend has been the modeling of network functions as a series of layers, each of which behaves according to a standard protocol, a set of rules for interaction that is implemented in software or hardware. Layering reduces the complexity of the network system and minimizes the amount of standardization necessary, which makes it easier for networks to join the Internet. A third important feature of the Internet’s technical development has been an unusually decentralized and participatory design process. This has opened the system to innovation from a variety of directions and has encouraged informal worldwide collaboration. The following sections describe some of the major milestones in the evolution of the Internet and its predecessors.

Section A: A(n) is a collection of information, generally stored as computer files. The information it contains can be stored, updated, organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as a(n) file. A(n) file use

Answers

Answer:

A database is a collection of information, generally stored as computer files. The information it contains can be stored, updated,  organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as an unstructured file. A structured file uses a uniform format to store data for each person or thin in the file

Explanation:

A database is a systematically structured collection of data or information that is usually digitally and electronically stored within an computer

Unstructured files are large number of files that are not stored based on structural properties, or kept in an organized format

Structured file are files that are keeps data in a uniform organized structural format

You are the Administrator for a large company that has offices around the world. Each office has employees in the Sales department and each location has created their own Sales folder for storing important Sales related files. You would like to implement a Window Role to minimize the duplication of files within the Sales department. Which File System can you install as a Windows Role to help you accomplish this goal?

Answers

Answer:

Transactional File System

Explanation:

To minimize the duplication of files within the Sales department. Transactional File System can make multiple file system changing, and if there is an error on one of the files then there will be no change.

Other Questions
Can some please help please thank you th hm s c bao nhiu tim cn A cylindrical 5.00-kg reel with a radius of 0.600 m and a frictionless axle, starts from rest and speeds up uniformly as a 3.00-kg bucket falls into a well, making a light rope unwind from the reel. The bucket starts from rest and falls for 4.00 s.Required:a. What is the linear acceleration of the falling bucket? b. How far does it drop? c. What is the angular acceleration of the reel? When a bomb is suspected of being planted in a room, how is a search for the bomb generally conducted?by starting at one end of the room, fanning out, and then proceeding until reaching the other endby type of material: metal objects are inspected first, then plastic, then all othersby height, starting below hip level then working upward, sweeping around the room at each levelby dividing the room into quadrants, then sweeping one quadrant at a time In the context of the components of a typical expert system, _____ is similar to a database, but in addition to storing facts and figures it keeps track of rules and explanations associated with facts. After the United States declared war on Germany, approximately how long did it take for over a million American troops toarrive in Europe?A.two monthsB.two yearsC.one monthD.one year I need help answer asap Sage Company is operating at 90% of capacity and is currently purchasing a part used in its manufacturing operations for $18.00 per unit. The unit cost for the business to make the part is $20.00, including fixed costs, and $9.00, not including fixed costs. If 30,694 units of the part are normally purchased during the year but could be manufactured using unused capacity, the amount of differential cost increase or decrease from making the part rather than purchasing it would be a Which of the following is equal to -27? It is known that the length of time that people wait for a city bus to arrive is right skewed with mean 6 minutes and standard deviation 4 minutes. A sample of 25 wait times is randomly selected. What is the standard deviation of the sampling distribution of the sample wait times In measuring GDP as the sum of all incomes earned in production, we should include: purchases of used goods. purchases of used goods. American purchases of foreign output. American purchases of foreign output. wages and salaries. wages and salaries. Given mn, find the value of x and y.m35xyX=y =PLS HELP Im kinda really confused What is the simplified form of ((15xy^2)/(x^2+5x+6))/((5x^2y)/2x^2+7x+3)) Please help me with this, But I cant decide if its A or B. Please explain !!! Please help meA person starts walking from home and walks: 6 miles East 6 miles Southeast 3 miles South 5 miles Southwest 2 miles East This person has walked a total of 22Correct miles Find the total displacement vector for this walk: If this person walked straight home, they'd have to walk miles What lines are parallel? when where they divided into 77units? LOL.HEY(Btw Im not new to brainly, but I just forgot my old password) *sigh* ughh I start school August second and its gonna be my first year in high-school .I- first of all summer break was wayyyyyyyyy too short basically 2 months and a half while the rest of the year I have to bust my behind preparing for test that dont have anything to do with MY future plans.eeeee every time I think about it my anxiety levels raise higher and higher ..if any upper class men have some advice plz tell mecuz I am legit terrified ngl (I checked out some freshmen tips on yxutube but that didnt really help that much) *and btw this is kind of academically related so need to report me* The management team at Electronics Galaxy is evaluating whether to have sales staff wear uniforms on the showroom floor . What should they consider about wearing uniforms ? a) How staff are dressed doesn't usually have much of an impact on customers b) Uniforms can help customers identify members of the sales staff. Oc ) Team morale usually suffers when uniforms are put in place . d) Uniforms can take away from each employee's individual personality. 11. The unit digit in the expression (31 + 132 + 143 + 414 + 515 +156 + 61) i (A) 4 (B) 3 (C) 2 . (D) 1