Is computer science hard to study ?

Answers

Answer 1

Answer:

no so easy

Explanation:


Related Questions

How do computers use input and output to get and give the information that they need to solve problems?

Answers

Answer:

typing on a keyboard (input) makes letter appear on a screen (output)is removing that

In this exercise we have to be able to explain the difference between output and input used in computers, like this:

So the output allows some information to appear on the screen while the input is a string.

In this way we will define some characteristics of each one as:

Output devices are devices that display data and information processed by the computer, also called output units (input/output). In other words, they allow communication from the computer to the user. Examples: video projector, printer and monitor.

The input() function receives as a parameter a string that will be shown as an aid to the user, usually informing him what kind of data the program is expecting to receive.

What is the difference between Input and Output?

Input, means: Contribute, Input, Insert and etc. In the case of Output, its meaning is: Output, Production, Power, Send.

See more about input or output at brainly.com/question/408477

how would you feel if the next version of windows becomes SaaS, and why?

Answers

If the next version of Windows becomes SaaS, SaaS or Software as a Service is a software delivery model in which software is hosted on the cloud and provided to users over the internet.

Moving Windows to a SaaS model means that Microsoft will continue to deliver updates and new features through a subscription-based service rather than through major new versions of the operating system.

This approach has its own advantages and challenges.

Benefits of the SaaS model for Windows:

Continuous Updates: Users receive regular updates and new features, ensuring they always have access to the latest improvements and security patches.

Flexibility: Subscriptions offer different tiers and plans so users can choose the features they need and customize their experience.

Lower upfront costs: A subscription model could reduce the upfront cost of purchasing Windows, making Windows more accessible to a wider audience.

Improved security: Continuous updates can help address vulnerabilities and security threats more rapidly, enhancing overall system security.

Challenges and concerns with a SaaS model for Windows:

Dependency on internet connectivity: Users would need a stable internet connection to receive updates and access features, which may not be ideal for those in areas with limited or unreliable internet access.

Privacy and data concerns: Users might have concerns about data collection, privacy, and the potential for their usage patterns to be monitored in a subscription-based model.

Cost considerations: While a subscription model may provide flexibility, some users may find it less cost-effective in the long run compared to purchasing a traditional license for Windows.

Compatibility issues: Continuous updates could introduce compatibility challenges for legacy software and hardware that may not be updated or supported in the new model.

Whether you view Windows' migration to a SaaS model as a positive or negative is ultimately determined by your personal perspective and specific implementations by Microsoft.

Cost: SaaS is a subscription-based model, which means users have to pay recurring fees to use the software.

They have to rely on the provider to update, maintain, and improve the software.To sum up, I would feel hesitant about using SaaS if the next version of Windows becomes SaaS.

For more questions on Software as a Service:

https://brainly.com/question/23864885

#SPJ8

For each of the following relations on the set of all real numbers, decide whether or not the relation is reflexive, symmetric, antisymmetric, and/or transitive. Give a brief explanation of why the given relation either has or does not have each of the properties. (x,y) E R if and only if:
(1) x + y = 0
(2) x – y is a rational number (a rational number is a number that can be expressed in the form a/b where a and b are integers)
(3) x = 2y
(4) xy >= 0

Answers

Answer:

See the explanation

Explanation:

Rules to Remember:

If R is the relation on set A, then:

R is REFLEXIVE when if (a,a)∈R for every element a∈A

R is SYMMETRIC if (b,a)∈R whenever (a,b)∈R

R is ANTI-SYMMETRIC if (b,a)∈R and (a,b)∈R such that a=b

R is TRANSITIVE if (a,b)∈R and (b,c)∈R such that (a,c)∈R

1) x + y = 0:

R is NOT REFLEXIVE because x + x = 0 only when x = 0, not for all real numbers.

R is SYMMETRIC because x + y = 0 , then y + x = 0.

R is NOT ANTI-SYMMETRIC because 1 + (-1) = 0 and (-1) + 1 = 0 where 1 ≠ -1

R is NOT TRANSITIVE because 1 + (-1) = 0 and (-1) + 1 = 0, while 1 + 1 ≠ 0

2) x - y is a Rational Number:

R is REFLEXIVE because x - x = 0 where 0 is a rational number.

R is SYMMETRIC because x - y  is a rational number, then y - x = - (x - y) is also a rational number.

R is NOT ANTI-SYMMETRIC because 1 - 2 and 2 - 1 both are rational numbers where   1 ≠ 2

R is TRANSITIVE because if x - y is a rational number and y - z is a rational number, then x - z = (x - y) - (y - z) is also a rational number

3) x = 2y

R is NOT REFLEXIVE because x = 2x only when x = 0, not for all real numbers.

R is NOT SYMMETRIC because 2 = 2(1)  while 1 ≠ 2(2)

R is ANTI-SYMMETRIC because x = 2y and y = 2x, then x - y = 0 (As x = 2y = 2(2x) = 4x is only true when x = 0)

R is NOT TRANSITIVE because x = 2y and y = 2z,  then x = 2(2z) = 4z, which is not equal to x = 2z

4) xy ≥ 0

R is REFLEXIVE because xx = x² ≥ 0 which is always true

R is SYMMETRIC because xy = yx ≥ 0

R is NOT ANTI-SYMMETRIC because (2)(1) ≥ 0 and (1)(2) ≥ 0 where 1 ≠ 2

R is NOT TRANSITIVE because if x = -1, y = 0, z = 1, then xy ≥ 0, yz ≥ 0 but xz ≤ 0

Question 10 of 10
What information system would be most useful in determining what direction
to go in the next two years?
A. Decision support system
B. Transaction processing system
C. Executive information system
D. Management information system
SUBMIT

Answers

Answer: C. Executive information system

Explanation: The information system that would be most useful in determining what direction to go in the next two years is an Executive Information System (EIS). An EIS is designed to provide senior management with the information they need to make strategic decisions.

An Executive Information System (EIS) would be the most useful information system in determining what direction to go in the next two years. So, Option C is true.

Given that,

Most useful information about determining what direction to go in the next two years.

Since Executive Information System is specifically designed to provide senior executives with the necessary information and insights to support strategic decision-making.

It consolidates data from various sources, both internal and external, and presents it in a user-friendly format, such as dashboards or reports.

This enables executives to analyze trends, identify opportunities, and make informed decisions about the future direction of the organization.

EIS typically focuses on high-level, strategic information and is tailored to meet the specific needs of top-level executives.

So, the correct option is,

C. Executive information system

To learn more about Executive information systems visit:

https://brainly.com/question/16665679

#SPJ6

Explain why you would select the waterfall model to implement the baby monitoring system by describing the advantages of using the waterfall model in projects like this which consists of a large scope.

Answers

The waterfall model's benefits includes Teams must follow a set of stages in a waterfall process, never going on until each phase is finished. Smaller projects with clear-cut deliverables from the beginning are best suited for this framework.

Why did you choose waterfall model?

When a project must adhere to stringent guidelines, the waterfall technique is preferable because it calls for deliverables for each step before moving on to the next.

Note that As an alternative, Agile is better suited for teams who want to move quickly, experiment with direction, and start without knowing exactly how the project will turn out.

Therefore, The sequential Waterfall Model separates software development into pre-established segments. Before the following phase can start, each phase must be finished.

Learn more about Waterfall Model from

https://brainly.com/question/14079212
#SPJ1

Use cin to read integers from input as work readings until two readings are read that are greater than or equal to 5. Output the two
readings in the given range. End each output with a newline.
Ex: If the input is 4 10 8, then the output is:
10
8


This is what I have :
#include
using namespace std;
int main() {
int currentwork;
int numSuccesses;
cin >> currentwork;
numSuccesses = 0;
while (currentwork >= 5) {
if (currentwork >= 5) {
cout << currentwork << endl;
numSuccesses++; }
else if (numSuccesses == 2) {
cout << currentwork << endl;
return 0;
}

Answers

reading a statement with several items. In one cin statement, many values could be read. For instance, cout Put two integers here.

What are integers?

An integer, pronounced "IN-tuh-jer," is a whole number that may be positive, negative, and 0 and is not a fraction.

Integer examples include: -5, 1, 5, 8, 97, & 3,043.

The following numbers are examples of non-integers: -1.43, 1 3/4, 3.14,.09, and 5,643.

1. The formal definition of the collection of integers designated Z is as follows:

Z = {..., -3, -2, -1, 0, 1, 2, 3, ...}

Unknown or unidentified integers are denoted in mathematical equations by lowercase, italicised letters from of the "late middle" of a letter. P, q, r, & s are the most prevalent. Denumerable sets include the set Z. Denumerability is the property that even though a set may contain an endless number of elements, those elements can still be represented by a list.

To know more about integers follow visit:

https://brainly.com/question/18411340

#SPJ1

Describe how hash functions work and what they are used for.
Describe symmetric and asymmetric encryption.
Describe digital certificates.

Answers

A hash  function is a mathematical function that takes an recommendation (or 'message') and produces a established-size series of characters, which shows a unique 'fingerprint' of the input.

What is the hash functions?

Symmetric encryption, also known as joint-secret encryption, is a type of encryption where the unchanging key is used for two together encryption and decryption.

Asymmetric encryption uses a public and private key to encrypt and decrypt data. Asymmetric encryption is slower but enables secure communication without the same secret key. Examples are RSA and ECC.

Learn more about hash functions from

https://brainly.com/question/13164741

#SPJ1

Match the components of a blog to their descriptions.
1. entry title
2. permalink
3. entry date
4. comment
place where a blog posting is located
when the posting became available
allows users to add to the conversation
name of the posting

Answers

Answer:

Entry title - Name of the posting.

Permanent link - Place where a posting blog is located.

entry date - when the posting became available

comment allows users to add to the conversation.

Entry title - Name of the posting.

Permanent link - Place where a posting blog is located.

entry date - when the posting became available

comment allows users to add to the conversation.

What is blogging site?

A blogging site is a social media platform where users post news items and hold conversations on specified topics.Item can refer to a variety of different things. In terms of physical objects, an item is a distinct unit that can be counted or measured.

It may refer to a physical product, such as a piece of furniture, a toy, or a piece of clothing. In the business world, item may refer to a unit of inventory, a product for sale, or a service that is available for purchase. In accounting, an item is an individual entry on a financial statement.

In computing, an item is a distinct piece of data stored in a database, such as a document, an image, or a video. Finally, item may also refer to a task or piece of work that has been assigned to an individual.

To learn more about item on

brainly.com/question/2040044

#SPJ2

answer is LOLOLyour so dumb jk its a i got it right

Answers

Ah well yes I know I’m dumb

explain the difference between numbered text and outline numbered text in terms of their use.​

Answers

Answer:

With numbered text, the last identifier also conveys how many blocks were in the list. With outline-numbered text, the items are in a well-ordered hierarchy.

I hope this might helps a little bit.

Numbered text refers to a method of numbering in which numbers are placed in front of text such as 1, 2, 3, and so on. Therefore, a simple numbered or bulleted list can be employed in numbered text.

Outline numbered text refers to the numbering that is employed when there is a combination of bullets and numbers, or whether the list is a structured, hierarchical list or an outline. For example, in a legal or structured document, outline numbering assigns sections like 1.1, 1.2, and 1.3, before progressing to 2 (where we will have 2.1. 2.2, and 2.3), etc.

C++ Add each element in origList with the corresponding value in offsetAmount. Print each sum followed by a semicolon (no spaces).

Ex: If origList = {4, 5, 10, 12} and offsetAmount = {2, 4, 7, 3}, print:
6;9;17;15;

#include
#include
using namespace std;

int main() {
const int NUM_VALS = 4;
int origList[NUM_VALS];
int offsetAmount[NUM_VALS];
int i;

cin >> origList[0];
cin >> origList[1];
cin >> origList[2];
cin >> origList[3];

cin >> offsetAmount[0];
cin >> offsetAmount[1];
cin >> offsetAmount[2];
cin >> offsetAmount[3];

/* Your code goes here */

cout << endl;

return 0;
}

Answers

Answer:

here you go, if it helps ,do consider giving brainliest

Explanation:

#include<stdio.h>

int main(void)

{

  const int NUM_VALS = 4;

  int origList[4];

  int offsetAmount[4];

  int i = 0;

  origList[0] = 40;

  origList[1] = 50;

  origList[2] = 60;

  origList[3] = 70;

  offsetAmount[0] = 5;

  offsetAmount[1] = 7;

  offsetAmount[2] = 3;

  offsetAmount[3] = 0;

  // Prints the Sum of each element in the origList

  // with the corresponding value in the

  // offsetAmount.

  for (i = 0;i<NUM_VALS;i++)

  {

      origList[i] += offsetAmount[i];

      printf("%d ", origList[i]);

  }

  printf("\n");

  return 0;

}

Although there are three well-known operating systems, the most common are Microsoft Windows and Mac OS. Discuss the similarities and differences between these two systems.

Answers

Answer:

There are very few similarities beyond some convergent features of their respective user interfaces. Their internal architecture is very different, differing from kernel models to shell integration to executable formats. A comprehensive list of similarities is neither possible nor useful, because it would consist mostly of obvious statements like "They are both operating systems" or "They both have graphical user interfaces, "They both include

Explanation:

How's that?

Why is sequencing important?

A. It allows the programmer to test the code.
B. It allows the user to understand the code.
C. It ensures the program works correctly.
D. It makes sure the code is easy to understand.

Answers

Answer:

c i think but if not go with d

Answer:

C

Explanation:

It ensures the program works correctly

hope it helps!

Create a defined name for range b6:e6 using walkup as the range name

Answers

In order to create a defined name for the range, one must follow the steps below.

What are the steps to creating a named range?

Step 1 - Select the concerned range (Rows and columns inclusive of the labels)Step 2 - From the Ribbon above, select Formulas. Then select "Create From Selection".From the "Create From Selection" dialogue box, select the option that is indicative of the location of your row / column.Click "Ok".

Learn more about Named Range at:
https://brainly.com/question/13396823
#SPJ1

it is not necessary to do anything to obtain a copyright.
O False
O True

Answers

Answer: false

Explanation:

Answer:

False.

Explanation:

It is necessary to do something to obtain a copyright. A copyright is a form of intellectual property protection that grants the creator of an original work exclusive rights to the use and distribution of that work.

In order to obtain a copyright, the creator must register the work with the U.S. Copyright Office. This registration process requires the creator to submit an application, a nonrefundable filing fee, and a copy of the work to be registered. Once the application is approved, the copyright is officially registered and the creator is granted exclusive rights to the work.

Write a python program the find out the average of a set of integers using a WHILE loop.

Answers

amount = int(input("How many numbers will you append?: "))

list = []

for i in range(amount):

   list.append(int(input("Number "+str(i+1)+": ")))

   

print("The average is:",sum(list)/amount)

The code written by the other person is not optimized. Instead, you can use this code with only 7 lines.

Write a python program the find out the average of a set of integers using a WHILE loop.

Python programming that is used to find out the average of a set of integers using a WHILE loop is as follows:

        amount = int(input("How many numbers will you append?: "))

        list = []

            for i in range(amount):

        list.append(int(input("Number "+str(i+1)+": ")))

            print("The average is:",sum(list)/amount).

What is the significance of Python programming?

Python is commonly used for developing websites and software, task automation, data analysis, and data visualization. Since it's relatively easy to learn, Python has been adopted by many non-programmers such as accountants and scientists, for a variety of everyday tasks, like organizing finance.

Python can create an intuitive and interactive user interface for your website or mobile application. It is an excellent language for new-age technologies and concepts such as Big Data, Machine Learning, Data Analysations, Visualisations, and many more.

Therefore, python programming that is used to find out the average of a set of integers using a WHILE loop is well described above.

To learn more about Python programming, refer to the link:

https://brainly.com/question/26497128

#SPJ2

What color model should Joe use if he will be using an offset printing press?

Answers

Answer:

The color model used for an offset printing press should involve cyan, magenta, yellow and black. The combination of this creates a black color.

Offset printing doesn’t involve the direct contact of the ink with the paper. The ink usually comes in contact first with a rubber cylinder after which the cylinder makes the necessary imprints on the paper.

How do you increase the number of tries by one?

tries.add(1)

tries = tries + 1

tries = 1

Answers

Answer:

tries = tries + 1

Explanation:

This is a universal way to increment your variable. In some languages, the following notation also works:

tries++;

tries += 1;

Again, it depends upon the language you are using. Each language has it's own syntax.

: "I have a customer who is very taciturn."

: "I have a customer who is very taciturn."

Answers

The client typically communicates in a reserved or silent manner

B. He won't speak with you.

Why are some customers taciturn?

People who are taciturn communicate less and more concisely. These individuals do not value verbosity. Many of them may also be introverts, but I lack the scientific evidence to support that assertion, so I won't make any inferences or make conclusions of that nature.

The phrase itself alludes to the characteristic of reticence, of coming out as distant and uncommunicative. A taciturn individual may be bashful, naturally reserved, or snooty.

Learn more about taciturn people here:

https://brainly.com/question/30094511

#SPJ1

1. Star Topology : Advantages 2. Bus Topology : ****************************** Advantages Tree Topology : Disadvantages Disadvantages EEEEE​

Answers

Star Topology (Advantages):

Easy to install and manage.Fault detection and troubleshooting is simplified.Individual devices can be added or removed without disrupting the entire network.

Bus Topology (Advantages):

Simple and cost-effective to implement.Requires less cabling than other topologies.Easy to extend the network by adding new devices.Suitable for small networks with low to moderate data traffic.Failure of one device does not affect the entire network.

Tree Topology (Disadvantages):

Highly dependent on the central root node; failure of the root node can bring down the entire network.Complex to set up and maintain.Requires more cabling than other topologies, leading to higher costs.Scalability is limited by the number of levels in the hierarchy.

Read more about Tree Topology here:

https://brainly.com/question/15066629

#SPJ1

What type services can be offered by a single insurance plan or the joint venture among two or more insurance payers this option provide subscribers or employees the choice of HMO PPO or traditional health insurance plans

Answers

A single insurance plan or a joint venture among two or more insurance payers can offer a variety of services, including HMO, PPO, or traditional health insurance plans, providing subscribers or employees with a choice of coverage options.

When an insurance plan is offered by a single insurance provider or through a joint venture between multiple insurance payers, it can offer a range of services to cater to the diverse needs of subscribers or employees. These services typically include Health Maintenance Organization (HMO), Preferred Provider Organization (PPO), or traditional health insurance plans.

HMO plans generally offer comprehensive coverage with a focus on preventive care and coordination of healthcare services through a network of healthcare providers. Subscribers are required to choose a primary care physician (PCP) and obtain referrals for specialist care.

PPO plans provide more flexibility and choice by allowing subscribers to receive care from both in-network and out-of-network providers. They do not require a PCP or referrals, offering more freedom to seek care from a wider range of healthcare professionals.

Traditional health insurance plans, also known as fee-for-service plans, provide the most flexibility in terms of choosing healthcare providers. Subscribers can visit any doctor or specialist without requiring referrals, but they may have higher out-of-pocket costs.

By offering these different types of plans, a single insurance plan or a joint venture among insurance payers can accommodate varying preferences and needs of individuals or employees, allowing them to select the coverage option that best suits their healthcare requirements.

For more such answers on insurance plan

https://brainly.com/question/31773844

#SPJ8

What is the word to tell excel that you want it to do math

Answers

Are you referring to functions? In a cell you can type "=" and it will allow you to enter a formula to insert math equations involving other cell values.

What is the difference between popular art and high art?

Answers

Answer:

Explanation:  In contrast, popular art often follows proven formulas that have been shown to appeal to large groups

From the time users first visit a new website, or view a new media piece, how much time will they spend on the site before they move on?

a- They will spend as little time as possible; people tend to pay little attention to new sites.

b- They will spend as much time as they have; people tend to linger on new websites.

c- They will stay as long as they have to; this is why it is a good idea to “hide” important information.

d- They will stay as long as they are engaged; this is why it is a good idea to make important information easy to find.

Answers

Answer:

D

Explanation:

They will stay as long because they want to explore and find out new things on that site and if possible compare with the other sites they have seen

Answer: He's right

Explanation: I got the answer too

If you have a really good picture of your friend, it is okay to post without asking because they allowed you to take it in the first place. O True O False​

Answers

false-you shouldn’t post anything with other peoples consent.
The correct answer is false.

Prepare Mounthly Payroll to xy Company which Calculate Tax, Pension Allowance, over time and Vet for each employce​

Answers

Make a payroll calculation using ADP® Payroll. Get 3 Months of Payroll Free! ADP® Payroll makes the payroll process quicker and simpler. Get ADP® Payroll Started Today! Time and presence. IRS tax deductions.

How do you calculate Monthly Payroll ?

You're ready to determine the employee's pay and the amount of taxes that must be deducted once you've set up your employees (and your firm, too). Making appropriate deductions for things like health insurance, retirement benefits, or garnishments, and, if necessary, adding back reimbursements for expenses. Going from gross compensation to net pay is the technical word for this.

Feel free to jump to the step you're searching for if you're having trouble understanding a particular one: First, determine your gross pay. Step 2: Determine the employee tax with holdings for 2019 or earlier and 2020 or later. Add any expense reimbursements in step four. Step 5: Compile everything.

To learn more about Payroll refer to :

https://brainly.com/question/30086703

#SPJ1


How does a hash help secure blockchain technology?

Hashes do not allow any new blocks to be formed on a chain or new data to be
added, Hashes block all changes.

Hashes are like fingerprints that make each block of data unique, Blocks form a
chain that can only have new blocks added.

Hashtags allow others to see if someone is trying to change something and it
alerts the government to prevent the changes.

Blocks of data require passwords that are called hashes, Hashes are impossible
to guess.

Answers

Blocks of data require passwords that are called hashes, Hashes are impossible to guess.

Blockchain security and Hash function

A hash is a function that meets the encryption requirements required to secure data. Because hashes have a set length, it is nearly impossible to estimate the hash if attempting to crack a blockchain.

The same data always yields the same hashed value. Hashes are one of the blockchain network's backbones.

Learn more about Blockchain security here:

https://brainly.com/question/31442198

#SPJ1

1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:

4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
 WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
 WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:

Answers

Network controls that would meet the requirements is option a) Stateful Firewall

Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option  b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEP

What is the statement about?

A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.

A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.

Learn more about network administrator  from

https://brainly.com/question/28729189

#SPJ1

Exercise : Randomizer In this exercise, we are going to create a static class Randomizer that will allow users to get random integer values from the method nextInt() and nextInt(int min, int max). Remember that we can get random integers using the formula int randInteger = (int)(Math.random() * (range + 1) + startingNum). nextInt() should return a random value from 1 - 10, and nextInt(int min, int max) should return a random value from min to max. For instance, if min is 3 and max is 12, then the range of numbers should be from 3 - 12, including 3 and 12.

Answers

Answer:

Here the code is by using java.

Explanation:

//Randomizer.java

public class Randomizer {

public static int nextInt() {

//get random number from 1-10

int randInteger = (int) (Math.random() * (11) + 1);

//if number is greater than 10 or less than 1

while (randInteger > 10 || randInteger < 1) {

randInteger = (int) (Math.random() * (11) + 1);

}

return randInteger;

}

public static int nextInt(int min, int max) {

//formula to get random number from min-max

int randInteger = (int) (Math.random() * (max + 1) + min);

while (randInteger > max || randInteger < min) {

randInteger = (int) (Math.random() * (max + 1) + min);

}

return randInteger;

}

}

//RandomizerTester.java

public class RandomizerTester {

public static void main(String[] args) {

System.out.println("Results of Randommizer.nextInt()");

for (int i = 0; i < 10; i++) {

System.out.println(Randomizer.nextInt());

}

int min = 5;

int max = 10;

System.out.println("\n Results of Randomizer.nextInt(5,10)");

for (int i = 0; i < 10; i++) {

System.out.println(Randomizer.nextInt(min, max));

}

}

}

OUTPUT:

Results of Randommizer.nextInt()

9

2

3

8

5

9

4

1

9

2

Results of Randomizer.nextInt(5,10)

9

8

9

7

5

10

5

10

7

7

a) Importance of Software Engineering I​

Answers

Answer:

os, operating system is very important

Other Questions
What is comorbidity? a. co-occurrence of two disorders b. having two causes for a single disorder c. having two causes of death d. mental disorder leading to death What is the angular momentum at a radius of 2 m with an object of 5 kg at avelocity of 20 m/s? Which continent is Saint-Pierre et Miquelon closest to?North AmericaSouth AmericaAfricaEurasia a circle has a diameter of 7.6 feet the chromatids detach from one another and become visibly separated chromosomes during How has colonialism affected economy? HELP PLS!Explain Aristotles argument from potentiality to actuality,. How does Aquinas utilize this argument? What made it difficult for the Georgia colonists to compete with colonies like South Carolina? Give 3 pairs of prime numbers that add up to 50 Exercise 2 Find the personal pronouns that have antecedents within each sentence or sentence group. Draw one line under the personal pronoun. Draw two lines under its antecedent. Change the personal pronoun to agree in person with its antecedent. Correct the verb if necessary. The baby wiggled so much I thought I were going to drop him. in caring for a patient with a cvc which intervention is indicated to help prevent clabsi what would you say to somebody who has lost a football match? _____ is a deep-seated sense that forces other than the individual are responsible for what happens in his or her life.A) An external locus of controlB) Tolerance of uncertaintyC) An internal locus of controlD) Tolerance of failure Write an expression that represents the perimeter of the equilateral triangle Find the equation for the plane through the points Po(1.-5, -5). Q(-3,- 2, -1), and Role-5,3,0) Using a coefficient of - 17 for x, the equation of the plane is (Type an equation.) which of the following techniques is used in predictive analytics? a. optimization models b. data visualization c. data dashboards d. linear regression HELP ASAPTrevor bought 5 1/2 pounds of candy for his party. The candy costs $7.25 per poundWhat was the total cost of the candy for Trevor's party? a triangle has one side that measures 1 foot and another side that measures 24 inches. which is possible side of the lengths of the third side.I have 15 and 19 as a option Silver chloride is virtually insoluble in water so that the reaction appears to go to completion. How many grams of solid NaCl must be added to 25.0 mL of 0.366 M AgNO3 solution to completely precipitate the silver the nurse is reviewing a client's food log on a follow-up visit. for one meal, the client had 4 oz grilled salmon, 1 medium corn-on-the-cob, 2 cup grilled zucchini squash, 1 cup green salad with 2 tablespoons olive oil and vinegar salad dressing, and 12 oz diet soda. how many fat calories did this client consume in this meal?