Answer:
no so easy
Explanation:
How do computers use input and output to get and give the information that they need to solve problems?
Answer:
typing on a keyboard (input) makes letter appear on a screen (output)is removing that
In this exercise we have to be able to explain the difference between output and input used in computers, like this:
So the output allows some information to appear on the screen while the input is a string.
In this way we will define some characteristics of each one as:
Output devices are devices that display data and information processed by the computer, also called output units (input/output). In other words, they allow communication from the computer to the user. Examples: video projector, printer and monitor.The input() function receives as a parameter a string that will be shown as an aid to the user, usually informing him what kind of data the program is expecting to receive.What is the difference between Input and Output?Input, means: Contribute, Input, Insert and etc. In the case of Output, its meaning is: Output, Production, Power, Send.
See more about input or output at brainly.com/question/408477
how would you feel if the next version of windows becomes SaaS, and why?
If the next version of Windows becomes SaaS, SaaS or Software as a Service is a software delivery model in which software is hosted on the cloud and provided to users over the internet.
Moving Windows to a SaaS model means that Microsoft will continue to deliver updates and new features through a subscription-based service rather than through major new versions of the operating system.
This approach has its own advantages and challenges.
Benefits of the SaaS model for Windows:
Continuous Updates: Users receive regular updates and new features, ensuring they always have access to the latest improvements and security patches.
Flexibility: Subscriptions offer different tiers and plans so users can choose the features they need and customize their experience.
Lower upfront costs: A subscription model could reduce the upfront cost of purchasing Windows, making Windows more accessible to a wider audience.
Improved security: Continuous updates can help address vulnerabilities and security threats more rapidly, enhancing overall system security.
Challenges and concerns with a SaaS model for Windows:
Dependency on internet connectivity: Users would need a stable internet connection to receive updates and access features, which may not be ideal for those in areas with limited or unreliable internet access.
Privacy and data concerns: Users might have concerns about data collection, privacy, and the potential for their usage patterns to be monitored in a subscription-based model.
Cost considerations: While a subscription model may provide flexibility, some users may find it less cost-effective in the long run compared to purchasing a traditional license for Windows.
Compatibility issues: Continuous updates could introduce compatibility challenges for legacy software and hardware that may not be updated or supported in the new model.
Whether you view Windows' migration to a SaaS model as a positive or negative is ultimately determined by your personal perspective and specific implementations by Microsoft.
Cost: SaaS is a subscription-based model, which means users have to pay recurring fees to use the software.
They have to rely on the provider to update, maintain, and improve the software.To sum up, I would feel hesitant about using SaaS if the next version of Windows becomes SaaS.
For more questions on Software as a Service:
https://brainly.com/question/23864885
#SPJ8
For each of the following relations on the set of all real numbers, decide whether or not the relation is reflexive, symmetric, antisymmetric, and/or transitive. Give a brief explanation of why the given relation either has or does not have each of the properties. (x,y) E R if and only if:
(1) x + y = 0
(2) x – y is a rational number (a rational number is a number that can be expressed in the form a/b where a and b are integers)
(3) x = 2y
(4) xy >= 0
Answer:
See the explanation
Explanation:
Rules to Remember:If R is the relation on set A, then:
R is REFLEXIVE when if (a,a)∈R for every element a∈A
R is SYMMETRIC if (b,a)∈R whenever (a,b)∈R
R is ANTI-SYMMETRIC if (b,a)∈R and (a,b)∈R such that a=b
R is TRANSITIVE if (a,b)∈R and (b,c)∈R such that (a,c)∈R
1) x + y = 0:
R is NOT REFLEXIVE because x + x = 0 only when x = 0, not for all real numbers.
R is SYMMETRIC because x + y = 0 , then y + x = 0.
R is NOT ANTI-SYMMETRIC because 1 + (-1) = 0 and (-1) + 1 = 0 where 1 ≠ -1
R is NOT TRANSITIVE because 1 + (-1) = 0 and (-1) + 1 = 0, while 1 + 1 ≠ 0
2) x - y is a Rational Number:
R is REFLEXIVE because x - x = 0 where 0 is a rational number.
R is SYMMETRIC because x - y is a rational number, then y - x = - (x - y) is also a rational number.
R is NOT ANTI-SYMMETRIC because 1 - 2 and 2 - 1 both are rational numbers where 1 ≠ 2
R is TRANSITIVE because if x - y is a rational number and y - z is a rational number, then x - z = (x - y) - (y - z) is also a rational number
3) x = 2y
R is NOT REFLEXIVE because x = 2x only when x = 0, not for all real numbers.
R is NOT SYMMETRIC because 2 = 2(1) while 1 ≠ 2(2)
R is ANTI-SYMMETRIC because x = 2y and y = 2x, then x - y = 0 (As x = 2y = 2(2x) = 4x is only true when x = 0)
R is NOT TRANSITIVE because x = 2y and y = 2z, then x = 2(2z) = 4z, which is not equal to x = 2z
4) xy ≥ 0
R is REFLEXIVE because xx = x² ≥ 0 which is always true
R is SYMMETRIC because xy = yx ≥ 0
R is NOT ANTI-SYMMETRIC because (2)(1) ≥ 0 and (1)(2) ≥ 0 where 1 ≠ 2
R is NOT TRANSITIVE because if x = -1, y = 0, z = 1, then xy ≥ 0, yz ≥ 0 but xz ≤ 0
Question 10 of 10
What information system would be most useful in determining what direction
to go in the next two years?
A. Decision support system
B. Transaction processing system
C. Executive information system
D. Management information system
SUBMIT
Answer: C. Executive information system
Explanation: The information system that would be most useful in determining what direction to go in the next two years is an Executive Information System (EIS). An EIS is designed to provide senior management with the information they need to make strategic decisions.
An Executive Information System (EIS) would be the most useful information system in determining what direction to go in the next two years. So, Option C is true.
Given that,
Most useful information about determining what direction to go in the next two years.
Since Executive Information System is specifically designed to provide senior executives with the necessary information and insights to support strategic decision-making.
It consolidates data from various sources, both internal and external, and presents it in a user-friendly format, such as dashboards or reports.
This enables executives to analyze trends, identify opportunities, and make informed decisions about the future direction of the organization.
EIS typically focuses on high-level, strategic information and is tailored to meet the specific needs of top-level executives.
So, the correct option is,
C. Executive information system
To learn more about Executive information systems visit:
https://brainly.com/question/16665679
#SPJ6
Explain why you would select the waterfall model to implement the baby monitoring system by describing the advantages of using the waterfall model in projects like this which consists of a large scope.
The waterfall model's benefits includes Teams must follow a set of stages in a waterfall process, never going on until each phase is finished. Smaller projects with clear-cut deliverables from the beginning are best suited for this framework.
Why did you choose waterfall model?When a project must adhere to stringent guidelines, the waterfall technique is preferable because it calls for deliverables for each step before moving on to the next.
Note that As an alternative, Agile is better suited for teams who want to move quickly, experiment with direction, and start without knowing exactly how the project will turn out.
Therefore, The sequential Waterfall Model separates software development into pre-established segments. Before the following phase can start, each phase must be finished.
Learn more about Waterfall Model from
https://brainly.com/question/14079212
#SPJ1
Use cin to read integers from input as work readings until two readings are read that are greater than or equal to 5. Output the two
readings in the given range. End each output with a newline.
Ex: If the input is 4 10 8, then the output is:
10
8
This is what I have :
#include
using namespace std;
int main() {
int currentwork;
int numSuccesses;
cin >> currentwork;
numSuccesses = 0;
while (currentwork >= 5) {
if (currentwork >= 5) {
cout << currentwork << endl;
numSuccesses++; }
else if (numSuccesses == 2) {
cout << currentwork << endl;
return 0;
}
reading a statement with several items. In one cin statement, many values could be read. For instance, cout Put two integers here.
What are integers?An integer, pronounced "IN-tuh-jer," is a whole number that may be positive, negative, and 0 and is not a fraction.
Integer examples include: -5, 1, 5, 8, 97, & 3,043.
The following numbers are examples of non-integers: -1.43, 1 3/4, 3.14,.09, and 5,643.
1. The formal definition of the collection of integers designated Z is as follows:
Z = {..., -3, -2, -1, 0, 1, 2, 3, ...}
Unknown or unidentified integers are denoted in mathematical equations by lowercase, italicised letters from of the "late middle" of a letter. P, q, r, & s are the most prevalent. Denumerable sets include the set Z. Denumerability is the property that even though a set may contain an endless number of elements, those elements can still be represented by a list.
To know more about integers follow visit:
https://brainly.com/question/18411340
#SPJ1
Describe how hash functions work and what they are used for.
Describe symmetric and asymmetric encryption.
Describe digital certificates.
A hash function is a mathematical function that takes an recommendation (or 'message') and produces a established-size series of characters, which shows a unique 'fingerprint' of the input.
What is the hash functions?Symmetric encryption, also known as joint-secret encryption, is a type of encryption where the unchanging key is used for two together encryption and decryption.
Asymmetric encryption uses a public and private key to encrypt and decrypt data. Asymmetric encryption is slower but enables secure communication without the same secret key. Examples are RSA and ECC.
Learn more about hash functions from
https://brainly.com/question/13164741
#SPJ1
Match the components of a blog to their descriptions.
1. entry title
2. permalink
3. entry date
4. comment
place where a blog posting is located
when the posting became available
allows users to add to the conversation
name of the posting
Answer:
Entry title - Name of the posting.
Permanent link - Place where a posting blog is located.
entry date - when the posting became available
comment allows users to add to the conversation.
Entry title - Name of the posting.
Permanent link - Place where a posting blog is located.
entry date - when the posting became available
comment allows users to add to the conversation.
What is blogging site?A blogging site is a social media platform where users post news items and hold conversations on specified topics.Item can refer to a variety of different things. In terms of physical objects, an item is a distinct unit that can be counted or measured.
It may refer to a physical product, such as a piece of furniture, a toy, or a piece of clothing. In the business world, item may refer to a unit of inventory, a product for sale, or a service that is available for purchase. In accounting, an item is an individual entry on a financial statement.
In computing, an item is a distinct piece of data stored in a database, such as a document, an image, or a video. Finally, item may also refer to a task or piece of work that has been assigned to an individual.
To learn more about item on
brainly.com/question/2040044
#SPJ2
answer is LOLOLyour so dumb jk its a i got it right
explain the difference between numbered text and outline numbered text in terms of their use.
Answer:
With numbered text, the last identifier also conveys how many blocks were in the list. With outline-numbered text, the items are in a well-ordered hierarchy.
I hope this might helps a little bit.
Numbered text refers to a method of numbering in which numbers are placed in front of text such as 1, 2, 3, and so on. Therefore, a simple numbered or bulleted list can be employed in numbered text.
Outline numbered text refers to the numbering that is employed when there is a combination of bullets and numbers, or whether the list is a structured, hierarchical list or an outline. For example, in a legal or structured document, outline numbering assigns sections like 1.1, 1.2, and 1.3, before progressing to 2 (where we will have 2.1. 2.2, and 2.3), etc.
C++ Add each element in origList with the corresponding value in offsetAmount. Print each sum followed by a semicolon (no spaces).
Ex: If origList = {4, 5, 10, 12} and offsetAmount = {2, 4, 7, 3}, print:
6;9;17;15;
#include
#include
using namespace std;
int main() {
const int NUM_VALS = 4;
int origList[NUM_VALS];
int offsetAmount[NUM_VALS];
int i;
cin >> origList[0];
cin >> origList[1];
cin >> origList[2];
cin >> origList[3];
cin >> offsetAmount[0];
cin >> offsetAmount[1];
cin >> offsetAmount[2];
cin >> offsetAmount[3];
/* Your code goes here */
cout << endl;
return 0;
}
Answer:
here you go, if it helps ,do consider giving brainliest
Explanation:
#include<stdio.h>
int main(void)
{
const int NUM_VALS = 4;
int origList[4];
int offsetAmount[4];
int i = 0;
origList[0] = 40;
origList[1] = 50;
origList[2] = 60;
origList[3] = 70;
offsetAmount[0] = 5;
offsetAmount[1] = 7;
offsetAmount[2] = 3;
offsetAmount[3] = 0;
// Prints the Sum of each element in the origList
// with the corresponding value in the
// offsetAmount.
for (i = 0;i<NUM_VALS;i++)
{
origList[i] += offsetAmount[i];
printf("%d ", origList[i]);
}
printf("\n");
return 0;
}
Although there are three well-known operating systems, the most common are Microsoft Windows and Mac OS. Discuss the similarities and differences between these two systems.
Answer:
There are very few similarities beyond some convergent features of their respective user interfaces. Their internal architecture is very different, differing from kernel models to shell integration to executable formats. A comprehensive list of similarities is neither possible nor useful, because it would consist mostly of obvious statements like "They are both operating systems" or "They both have graphical user interfaces, "They both include
Explanation:
How's that?
Why is sequencing important?
A. It allows the programmer to test the code.
B. It allows the user to understand the code.
C. It ensures the program works correctly.
D. It makes sure the code is easy to understand.
Answer:
c i think but if not go with d
Answer:
C
Explanation:
It ensures the program works correctly
hope it helps!
Create a defined name for range b6:e6 using walkup as the range name
In order to create a defined name for the range, one must follow the steps below.
What are the steps to creating a named range?Step 1 - Select the concerned range (Rows and columns inclusive of the labels)Step 2 - From the Ribbon above, select Formulas. Then select "Create From Selection".From the "Create From Selection" dialogue box, select the option that is indicative of the location of your row / column.Click "Ok".Learn more about Named Range at:
https://brainly.com/question/13396823
#SPJ1
it is not necessary to do anything to obtain a copyright.
O False
O True
Answer: false
Explanation:
Answer:
False.
Explanation:
It is necessary to do something to obtain a copyright. A copyright is a form of intellectual property protection that grants the creator of an original work exclusive rights to the use and distribution of that work.
In order to obtain a copyright, the creator must register the work with the U.S. Copyright Office. This registration process requires the creator to submit an application, a nonrefundable filing fee, and a copy of the work to be registered. Once the application is approved, the copyright is officially registered and the creator is granted exclusive rights to the work.
Write a python program the find out the average of a set of integers using a WHILE loop.
amount = int(input("How many numbers will you append?: "))
list = []
for i in range(amount):
list.append(int(input("Number "+str(i+1)+": ")))
print("The average is:",sum(list)/amount)
The code written by the other person is not optimized. Instead, you can use this code with only 7 lines.
Python programming that is used to find out the average of a set of integers using a WHILE loop is as follows:
amount = int(input("How many numbers will you append?: "))
list = []
for i in range(amount):
list.append(int(input("Number "+str(i+1)+": ")))
print("The average is:",sum(list)/amount).
What is the significance of Python programming?Python is commonly used for developing websites and software, task automation, data analysis, and data visualization. Since it's relatively easy to learn, Python has been adopted by many non-programmers such as accountants and scientists, for a variety of everyday tasks, like organizing finance.
Python can create an intuitive and interactive user interface for your website or mobile application. It is an excellent language for new-age technologies and concepts such as Big Data, Machine Learning, Data Analysations, Visualisations, and many more.
Therefore, python programming that is used to find out the average of a set of integers using a WHILE loop is well described above.
To learn more about Python programming, refer to the link:
https://brainly.com/question/26497128
#SPJ2
What color model should Joe use if he will be using an offset printing press?
Answer:
The color model used for an offset printing press should involve cyan, magenta, yellow and black. The combination of this creates a black color.
Offset printing doesn’t involve the direct contact of the ink with the paper. The ink usually comes in contact first with a rubber cylinder after which the cylinder makes the necessary imprints on the paper.
How do you increase the number of tries by one?
tries.add(1)
tries = tries + 1
tries = 1
Answer:
tries = tries + 1
Explanation:
This is a universal way to increment your variable. In some languages, the following notation also works:
tries++;
tries += 1;
Again, it depends upon the language you are using. Each language has it's own syntax.
: "I have a customer who is very taciturn."
The client typically communicates in a reserved or silent manner
B. He won't speak with you.
Why are some customers taciturn?People who are taciturn communicate less and more concisely. These individuals do not value verbosity. Many of them may also be introverts, but I lack the scientific evidence to support that assertion, so I won't make any inferences or make conclusions of that nature.
The phrase itself alludes to the characteristic of reticence, of coming out as distant and uncommunicative. A taciturn individual may be bashful, naturally reserved, or snooty.
Learn more about taciturn people here:
https://brainly.com/question/30094511
#SPJ1
1. Star Topology : Advantages 2. Bus Topology : ****************************** Advantages Tree Topology : Disadvantages Disadvantages EEEEE
Star Topology (Advantages):
Easy to install and manage.Fault detection and troubleshooting is simplified.Individual devices can be added or removed without disrupting the entire network.Bus Topology (Advantages):Simple and cost-effective to implement.Requires less cabling than other topologies.Easy to extend the network by adding new devices.Suitable for small networks with low to moderate data traffic.Failure of one device does not affect the entire network.Tree Topology (Disadvantages):
Highly dependent on the central root node; failure of the root node can bring down the entire network.Complex to set up and maintain.Requires more cabling than other topologies, leading to higher costs.Scalability is limited by the number of levels in the hierarchy.Read more about Tree Topology here:
https://brainly.com/question/15066629
#SPJ1
What type services can be offered by a single insurance plan or the joint venture among two or more insurance payers this option provide subscribers or employees the choice of HMO PPO or traditional health insurance plans
A single insurance plan or a joint venture among two or more insurance payers can offer a variety of services, including HMO, PPO, or traditional health insurance plans, providing subscribers or employees with a choice of coverage options.
When an insurance plan is offered by a single insurance provider or through a joint venture between multiple insurance payers, it can offer a range of services to cater to the diverse needs of subscribers or employees. These services typically include Health Maintenance Organization (HMO), Preferred Provider Organization (PPO), or traditional health insurance plans.
HMO plans generally offer comprehensive coverage with a focus on preventive care and coordination of healthcare services through a network of healthcare providers. Subscribers are required to choose a primary care physician (PCP) and obtain referrals for specialist care.
PPO plans provide more flexibility and choice by allowing subscribers to receive care from both in-network and out-of-network providers. They do not require a PCP or referrals, offering more freedom to seek care from a wider range of healthcare professionals.
Traditional health insurance plans, also known as fee-for-service plans, provide the most flexibility in terms of choosing healthcare providers. Subscribers can visit any doctor or specialist without requiring referrals, but they may have higher out-of-pocket costs.
By offering these different types of plans, a single insurance plan or a joint venture among insurance payers can accommodate varying preferences and needs of individuals or employees, allowing them to select the coverage option that best suits their healthcare requirements.
For more such answers on insurance plan
https://brainly.com/question/31773844
#SPJ8
What is the word to tell excel that you want it to do math
Are you referring to functions? In a cell you can type "=" and it will allow you to enter a formula to insert math equations involving other cell values.
What is the difference between popular art and high art?
Answer:
Explanation: In contrast, popular art often follows proven formulas that have been shown to appeal to large groups
From the time users first visit a new website, or view a new media piece, how much time will they spend on the site before they move on?
a- They will spend as little time as possible; people tend to pay little attention to new sites.
b- They will spend as much time as they have; people tend to linger on new websites.
c- They will stay as long as they have to; this is why it is a good idea to “hide” important information.
d- They will stay as long as they are engaged; this is why it is a good idea to make important information easy to find.
Answer:
D
Explanation:
They will stay as long because they want to explore and find out new things on that site and if possible compare with the other sites they have seen
Answer: He's right
Explanation: I got the answer too
If you have a really good picture of your friend, it is okay to post without asking because they allowed you to take it in the first place. O True O False
Prepare Mounthly Payroll to xy Company which Calculate Tax, Pension Allowance, over time and Vet for each employce
Make a payroll calculation using ADP® Payroll. Get 3 Months of Payroll Free! ADP® Payroll makes the payroll process quicker and simpler. Get ADP® Payroll Started Today! Time and presence. IRS tax deductions.
How do you calculate Monthly Payroll ?You're ready to determine the employee's pay and the amount of taxes that must be deducted once you've set up your employees (and your firm, too). Making appropriate deductions for things like health insurance, retirement benefits, or garnishments, and, if necessary, adding back reimbursements for expenses. Going from gross compensation to net pay is the technical word for this.
Feel free to jump to the step you're searching for if you're having trouble understanding a particular one: First, determine your gross pay. Step 2: Determine the employee tax with holdings for 2019 or earlier and 2020 or later. Add any expense reimbursements in step four. Step 5: Compile everything.
To learn more about Payroll refer to :
https://brainly.com/question/30086703
#SPJ1
How does a hash help secure blockchain technology?
Hashes do not allow any new blocks to be formed on a chain or new data to be
added, Hashes block all changes.
Hashes are like fingerprints that make each block of data unique, Blocks form a
chain that can only have new blocks added.
Hashtags allow others to see if someone is trying to change something and it
alerts the government to prevent the changes.
Blocks of data require passwords that are called hashes, Hashes are impossible
to guess.
Blocks of data require passwords that are called hashes, Hashes are impossible to guess.
Blockchain security and Hash functionA hash is a function that meets the encryption requirements required to secure data. Because hashes have a set length, it is nearly impossible to estimate the hash if attempting to crack a blockchain.
The same data always yields the same hashed value. Hashes are one of the blockchain network's backbones.
Learn more about Blockchain security here:
https://brainly.com/question/31442198
#SPJ1
1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:
4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:
Network controls that would meet the requirements is option a) Stateful Firewall
Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEPWhat is the statement about?A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.
A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.
Learn more about network administrator from
https://brainly.com/question/28729189
#SPJ1
Exercise : Randomizer In this exercise, we are going to create a static class Randomizer that will allow users to get random integer values from the method nextInt() and nextInt(int min, int max). Remember that we can get random integers using the formula int randInteger = (int)(Math.random() * (range + 1) + startingNum). nextInt() should return a random value from 1 - 10, and nextInt(int min, int max) should return a random value from min to max. For instance, if min is 3 and max is 12, then the range of numbers should be from 3 - 12, including 3 and 12.
Answer:
Here the code is by using java.
Explanation:
//Randomizer.java
public class Randomizer {
public static int nextInt() {
//get random number from 1-10
int randInteger = (int) (Math.random() * (11) + 1);
//if number is greater than 10 or less than 1
while (randInteger > 10 || randInteger < 1) {
randInteger = (int) (Math.random() * (11) + 1);
}
return randInteger;
}
public static int nextInt(int min, int max) {
//formula to get random number from min-max
int randInteger = (int) (Math.random() * (max + 1) + min);
while (randInteger > max || randInteger < min) {
randInteger = (int) (Math.random() * (max + 1) + min);
}
return randInteger;
}
}
//RandomizerTester.java
public class RandomizerTester {
public static void main(String[] args) {
System.out.println("Results of Randommizer.nextInt()");
for (int i = 0; i < 10; i++) {
System.out.println(Randomizer.nextInt());
}
int min = 5;
int max = 10;
System.out.println("\n Results of Randomizer.nextInt(5,10)");
for (int i = 0; i < 10; i++) {
System.out.println(Randomizer.nextInt(min, max));
}
}
}
OUTPUT:
Results of Randommizer.nextInt()
9
2
3
8
5
9
4
1
9
2
Results of Randomizer.nextInt(5,10)
9
8
9
7
5
10
5
10
7
7
a) Importance of Software Engineering I
Answer:
os, operating system is very important