What will happen if you attempt to create a scanner for a nonexistent file? what will happen if you attempt to create a printwriter for an existing file?

Answers

Answer 1

If you attempt to create a Scanner for a nonexistent file, an exception will occur. If you attempt to create a PrintWriter for an existing file, the contents of the existing file will be gone.

The question above is part of Java programming language. Java is a programming language that may be used on a variety of computers, including gaming consoles. The current language was initially created by James Gosling when he first joined Sun Microsystems, which at the time was a branch of Oracle and was founded in 1995.

This language adopts a lot of syntax found in C and C++ but with a simpler object model syntax and minimal support for lower-level routines.

Learn more about Java Programming https://brainly.com/question/2266606

#SPJ4


Related Questions

When making changes to existing font, the user must first _____

Answers

Select the font dialog box

Why we use Social media. Spport your answer with logical reason

Answers

Through social media platforms like Facebiook, Twititer, and Insttagram, we can share updates, photos, and videos with our loved ones, no matter where they are in the world. Social media also provides a platform for networking and professional development.

We use social media for various reasons. One reason is that it allows us to connect with others and stay in touch with friends, family, and colleagues. LinnkedIn, for example, allows professionals to connect with others in their field, share expertise, and discover job opportunities.

Another reason for using social media is its ability to provide information and entertainment. We can follow news outlets, blogs, and influencers to stay informed and engaged. Additionally, social media enables us to join communities of like-minded individuals and participate in discussions on various topics. Overall, social media offers a convenient and accessible way to connect, learn, and be entertained.

To know more about social media platforms visit :-

https://brainly.com/question/32908918

#SPJ11

A Cisco security appliance can include all the following functions except:a. Intrusion prevention systemb. A routerc. A firewalld. A honeypot

Answers

A Cisco security appliance can include all of the following functions except a honeypot.

A Cisco security appliance is a network security device designed to provide various security functions to protect networks from various threats. Cisco security appliances can perform multiple security functions, including firewall, VPN, intrusion prevention system (IPS), content filtering, and malware protection. Honeypot is not a standard feature of a Cisco security appliance. A honeypot is a network security mechanism used to detect and deflect potential attacks. It involves setting up a system or network with vulnerabilities to attract attackers, allowing security teams to study and analyze their tactics, techniques, and procedures (TTPs). While Cisco security appliances can provide a range of security functions, they are not designed to act as honeypots.

In summary, a Cisco security appliance can provide various security functions, including a firewall, IPS, VPN, content filtering, and malware protection. However, it does not typically include a honeypot.

Learn more about network here: https://brainly.com/question/30456221

#SPJ11

Standard web design is:

Question 4 options:

Single media


Bi-media


Multimedia


Media free

Answers

Answer: Multimedia

Explanation:

I just took the test

maya and darius are using the software development life cycle to develop a career interest app. they wrote the program pseudocode and have a mock-up of how the software will look and how it should run. all their work at this step has been recorded in a design document. what should the team do next?

Answers

The SDLC is divided into five phases: inception, design, implementation, maintenance, and audit or disposal, which includes a risk management plan evaluation.

Agile SDLC is one of the most widely used software development methodologies. This is so dependable that some firms are adopting it for non-software tasks as well. All jobs are broken down into short time spans and completed in iterations. The seventh phase of SDLC is maintenance, which is responsible for the developed product. The programmed is updated on a regular basis in response to changes in the user end environment or technology. The RAD Model is divided into five phases: business modelling, data modelling, process modelling, application production, and testing and turnover. The spiral approach allows for progressive product launches and refining at each phase of the spiral, as well as the option to produce prototypes at each level. The model's most essential characteristic is its capacity to handle unexpected risks once the project has begun; developing a prototype makes this possible.

Learn more about software development  from here;

https://brainly.com/question/20318471

#SPJ4

FREE BRAINLIEST!!!
When recording a macro, the cursor will look like a _____ to indicate it is recording. A.microphone
B. Arrow
C. CD
D. cassette tape

Answers

Answer:

B

Explanation:

Answer:  

When recording a macro, the cursor will look like a cassette tape to indicate it is recording. This answer has been confirmed as correct and helpful.  

Explanation:

the correct answer is D

Write a Python script to input time in minutes , convert and print into hours and minutes.

Answers

Answer:

Following are the Python program to this question:  t=float(input("Enter time value in seconds: "))#input time in seconds by user

d = t // (24 * 3600) #calculate day and store in d variable  t= t % (24 * 3600)#calculate time and store in t variable  h = t // 3600#calculate hour and store in h variable  t %= 3600#calculate time and store in t variable  m=t // 60#calculate minutes and store in m variable  t%= 60#calculate time and store in t variable  s = t#calculate second and store in s variable  print("day:hour:minute:second= %d:%d:%d:%d" % (d,h,m,s))#print calculated value

Output:

Enter time value in seconds: 1239876

day:hour:minute:second= 14:8:24:36

Explanation:

Description of the above can be defined as follows:

In the above Python program code an input variable "t" is declared, which uses the input method to input value from the user end.In the next step, "d, m, and s" is declared that calculates and stores values in its variable and at the last print, the method is used to print its value.

what are the advantages of knowing demographics over psychographics and vice versa?

Answers

It's been said that demographics help you understand who buys your product or service, while psychographics helps you understand why they buy. Another way to put it is that demographics are things that can be observed from the outside, such as age and race, while psychographics are internal attributes or attitudes.

The online underground is used___.
Select 3 options.

The online underground is used___.Select 3 options.

Answers

Answer:

I think its the 4th one but im not that sure tho sorry!

Explanation:

Answer:

1,3,4

Explanation:

By cybercriminals to sell ransom services,by cybercriminals to purchase malicious software,for networking by criminal organizations

Which scenarios are examples of students managing their time well? Check all that apply. A student studies while watching her favorite television shows. A student sets aside time to study every afternoon at his desk. O A student writes down some goals that she hopes to achieve in school. A student drafts a study schedule that includes breaks. A student uses her desk calendar to record the due dates for her homework assignments. O A student rushes through his homework while sending text messages to friends. 3). Intro​

Answers

Answer:

b,c,d, and e

Explanation:

Hope this helps

Answer:

BCDE

Explanation:

EDG 2021

Impaired drivers are one of the many risks drivers face on the Highway Transportation System. List 3 signs that a driver could be potentially impaired. Explain a strategy that you can use to keep yourself safe.​

Answers

Three signs a driver could be potentially impaired is swerving on the road, driving slower than “normal” speed limit, and driving outside of the lines (when not changing lanes).

A strategy to keep yourself safe from impaired drivers could be to keep a safe distance from drivers nearby that are exhibiting erratic or potentially dangerous driving behavior.

Answer:

Three signs that could show that a driver is impaired are: Swerving on the road, driving slower than the speed limit, and driving on top of lines or inside and outside the lines. A strategy to be safe would be to keep a safe distance from the driver, not try to outrun or pass the driver, stay a good distance behind the impaired driver to avoid potentially dangerous driving.

which data type consumes the least storage space?
text
OLE object
yes/no
memo​

Answers

Answer:

yes/no

Explanation:

Since yes /no has a storage of only 1 bit. Text max. 250 characters, memo 65,535 characters, OLE object 4G.B.

Which file attribute identifies the file as having been modified since the last backup?.

Answers

Archive file identifies the file as having been modified since the last backup.


Archive file understanding

 The meaning of the word Archive in the Online Computer Dictionary is used to make a copy of a backup file with the aim of protecting the original copy from damage.


 How to Archive Files Into 1 File

 If you want to send a large number of files, you can make the file into 1 archive file format with .zip, .tar, or .rar format first.  This method is also quite easy and fast.

First, make sure your computer has programs such as winzip, winrar.  This program is needed to archive files.

•  Second, you can select the file you want to archive, then right-click on the file.  The example below shows 2 files to be archived

• The third step
, you can directly select Add to “folder name.rar” to directly create archive files automatically.  If you want to do some settings, it can be done by selecting the Add to archive option.

 The Add to archive option allows you to choose the save format of the file, divide or create the archive into several parts (part 1, part 2, etc.), to create a password.  With the password, before the file can be extracted, it is necessary to enter the password first.

 In addition to files, you can also archive folders directly along with the contents of the files in it.  Keep in mind, how fast the process of archiving this file will depend on how many or large files to be archived.


 Learn more about archive files at https://brainly.com/question/15355917.

#SPJ4

Checking a website author’s credentials is one way to establish a site’s _________. Group of answer choices security information literacy credibility copyright

Answers

Answer:

The answer is "Credibility".

Explanation:

By assessing the excellently-intended, factual, or unbiased" a Site is, users, assess reliability. It can be achieved by developers, which provides a useful set of information sections, and responses to the links for external sources or resources must be provided.  The credibility of its website is mostly about making the site accurate and accurate. Only 52.8% of internet users agree that digital information is consistent, and the incorrect choice can be defined as follows:

Information on security is used in designing, that's why it's wrong.literacy is used in understanding, that's why it's incorrect.copyright refers to the legal right, that's why it's incorrect.

UEFI has a security system called __________, which helps prevent malware from hijacking a system during or before the operating system load

Answers

The answer is Secure Boot

You are the Administrator for a large company that has offices around the world. Each office has employees in the Sales department and each location has created their own Sales folder for storing important Sales related files. You would like to implement a Window Role to minimize the duplication of files within the Sales department. Which File System can you install as a Windows Role to help you accomplish this goal?

Answers

Answer:

Transactional File System

Explanation:

To minimize the duplication of files within the Sales department. Transactional File System can make multiple file system changing, and if there is an error on one of the files then there will be no change.

In what two ways do Solution Trains enable dependent Agile Release Trains (ARTs) to collaborate and deliver more effectively? (Choose two.)
1. By aligning ARTs on a common cadence
2. By centralizing all compliance activities
3. By centralizing Solution design decisions
4. By aligning ARTs to a common Solution Vision
5. By ensuring Suppliers deliver against Milestones

Answers

Solution Trains enable dependent Agile Release Trains (ARTs) to collaborate and deliver more effectively in the following two ways: By aligning ARTs on a common cadence and by aligning ARTs to a common Solution Vision. So, first and fourth options are correct answer.

By aligning ARTs on a common cadence:

Solution Trains help synchronize the activities of dependent ARTs by establishing a shared rhythm or cadence for planning, execution, and delivery. This alignment ensures that teams are working together in a coordinated manner, reducing dependencies and improving overall efficiency.

By aligning ARTs to a common Solution Vision:

Solution Trains provide a shared vision and direction for the ARTs involved. They help align the efforts of multiple teams towards a common goal, ensuring that everyone is working towards the same outcomes and objectives. This alignment fosters collaboration, enables effective decision-making, and promotes a cohesive approach to delivering value.

Therefore, the correct answers are options 1 and 4.

To learn more about Agile Release Trains(ARTs): https://brainly.com/question/30456776

#SPJ11

Create a chart on basic commands used in HTML.
It should include basic body structure of HTML also.And make it beautiful

Answers

basic HTML commands

1 the head tag

2 titles

3 the body tag

4 headers

5 paragraph

6 performance text

7 bold face and italics

the HTML tag Al truth not currently required by the all clients the HTML tag signals the point where tax should started being interprinted as HTML code

Compute the discount factors for each of the 3 individuals:
Paolo’s discount rate = 5%
Chet’s discount rate = 18%
Jabari’s discount rate = 26%
2. In the Metropolitan City of Deep State there are 5 hospitals (DS1 to DS5)
DS1’s revenue is $1 billion
DS2’s revenue is $2 billion
DS3’s revenue is $4 billion
DS4’s share is 2X the share of DS5.
Total revenue of all 5 hospitals in Deep State is $25 billion
Compute the HH Index.
3. Given
IH = $5 m
IS ’ = $4 m
E(I) = $4.7 m
p = 10%
IH ’= $4 m
Describe this policy (full, partial,fair, unfair, combination?)
Solve for r
Solve for Is
Solve for q
4. ON the R-S graph describe the locations of
- Partial and Unfair
- Full and Unfair
5. Given starting point E on an R-S graph, assume both r and q increase with r change > q change.
What will be the location of the new point in relation to point E?
Ex. Left above E, Right below E, Left parallel to E, etc.

Answers

The HH File measures market concentration by considering the squared market offers of members, whereas a reasonable approach guarantees an impartial dispersion of assets among people.

How to compute the discount factors for each of the 3 individuals

1. To compute the discount variables for each person, we utilize the equation: Rebate figure = 1 / (1 + rebate rate).

Paolo's rebate figure = 1 / (1 + 0.05) = 0.9524

Chet's markdown figure = 1 / (1 + 0.18) = 0.8475

Jabari's rebate calculate = 1 / (1 + 0.26) = 0.7937

2. To compute the HH Record (Herfindahl-Hirschman Record), we ought to calculate the marketing offers of each healing center and square them, at that point entirety them up.

DS4's share = 2 * DS5's share

DS1's share = $1 billion / $25 billion = 0.04

DS2's share = $2 billion / $25 billion = 0.08

DS3's share = $4 billion / $25 billion = 0.16

DS5's share = 1 / 2 + 1 = 0.3333 (since DS4's share is twice DS5's share)

HH List =\(((0.04^2 + 0.08^2 + 0.16^2 + (2 * 0.3333)^2 + 0.3333^2)) = 0.2629\)

3. The given approach can be portrayed as reasonable. Since E(I) is break even with the normal of IH and IS', it demonstrates an evenhanded dissemination of assets among people.

Tackling for r: r = (IH' - E(I)) / E(I) = ($4m - $4.7m) / $4.7m = -0.1489 or -14.89%

Understanding for Is: Is = IS' / (1 + p) = $4m / (1 + 0.10) = $3.636m

Fathoming for q: q = Is / IH = $3.636m / $5m = 0.7272 or 72.72%

4. On the R-S chart:

Partial and fair: This point speaks to a circumstance whereas it where fractional assets are designated, and the dispersion is considered unjustifiable.Full and fair: This point speaks to a circumstance where all assets are designated, but the conveyance is still considered unjustifiable.

5. In case both r and q increment with a bigger alter in r compared to q, the modern point will be found to the cleared out of point E and underneath it on the R-S chart.

Learn more about discount factors here:

https://brainly.com/question/8691762

#SPJ4

Ram or Main memory is sometimes called this (NEED ASAP)

Ram or Main memory is sometimes called this (NEED ASAP)

Answers

Answer:

Software

Explanation:

It was able to be the only thing that came to mind.

What are some ways to rename a worksheet? Check all that apply.
Click and drag the tab to the right, type the name, and press Enter
Double-click the tab, type the name, and press Enter
Right-click the tab, click Rename, type the name, and press Enter.
Click the Home tab, click Format, click Rename Sheet, type the name, and press Enter
Click the View tab, click Tabs, click Names, type the name, and press Enter.

Answers

Answer:

Click the Home tab, click Format, click Rename Sheet, type the name, and press Enter

Explanation:

im  not really sure but i think this is the answer

have a good day

URGENT HTML5 can support videos and audio playback, but not 2D and 3D graphics.

A. True
B. False

Answers

Answer:

False I think.

Explanation:

Some binary files can include a magic number. this mechanism is used by __________.

Answers

Answer:

Parsers to identify the file format.

The OS to determine the file format.

Explanation:

The answer I gave is my best guess. The base of this question doesn't make sense because magic numbers can be used by several different things, so there is a broad range of answers for this. But Typically magic numbers are used to identify a file's validity or it's format

Please help!
Akira made a database to keep track of her books. She wants to create a list that displays only the books by a specific author. This is called a


report

chart

query

sort

Answers

Query is the answer, as we write query to create list that displays only the books by a specified author.

After a hurricane breaks all the windows in the stores on commercial street, under which circumstances is mark likely to start looting local businesses due to deindividuation?.

Answers

If the power is out and there is no law enforcement, Mark is likely to start looting local businesses.

Under which circumstances is mark likely to start looting local businesses due to individuation?

If the power is out and there is no law enforcement, Mark is likely to start looting local businesses because he would be able to take what he wants without being caught. Additionally, if there is no one around to stop him, he may feel like he can justify his actions.

In the aftermath of a hurricane, all the windows in the stores on commercial street have been broken. With no power and no law enforcement, people are starting to loot local businesses. Mark is one of them.

Learn more about Business: https://brainly.com/question/24553900

#SPJ4

name two different colors used in the python program file window.name the type of program content that has each color ......

whoever answer this correct i will rate them 5 stars and a like .....
please urgent ​

Answers

In the Python program window, black is used for code and syntax, while white is used as the background.

How is this so?

1. Black  -  The color black is typically used for the program's code and syntax. It represents the actual Python code and includes keywords, functions, variables, and other programming constructs.

2. White  -  The color white is commonly used as the background color in the program window. It provides a clean and neutral backdrop for the code and makes it easier to read and understand.

Learn more about python program at:

https://brainly.com/question/26497128

#SPJ1

What is an accessor in Java?

A
It's how Java accesses databases.

B
It's what Java classes use to get access to disk files.

C
It's a method that retrieves information from private class attributes.

D
It's a means of accessing the names of attributes in a class.

Answers

A because I know this I hade this in my class too

Match each task with the features necessary to complete the task

Match each task with the features necessary to complete the task

Answers

Answer:

the first one on the left row to the 3rd one in the right row

the second one on the left row to the top one in the right row

the third one on the left row to the middle one in the right row

Explanation:

looks like you got it right though already

regarding a client-to-site and site-to-site virtual private networks (vpn), which of the following is true? choose all that apply. group of answer choices a client-to-site vpn interconnects two sites, as an alternative to a leased line, at a reduced cost. a client-to-site vpn (also known as a remote access vpn) interconnects a remote user with a site, as an alternative to dial-up or isdn connectivity, at a reduced cost. a site-to-site vpn (also known as a remote access vpn) interconnects a remote user with a site, as an alternative to dial-up or isdn connectivity, at a reduced cost. a site-to-site vpn interconnects two locations, as an alternative to a leased line, at a reduced cost.

Answers

The true statements regarding client-to-site and site-to-site VPNs are that a client-to-site VPN interconnects a remote user with a site, while a site-to-site VPN interconnects two locations.

To identify the true statements regarding client-to-site and site-to-site VPNs?

Client-to-site and site-to-site Virtual Private Networks (VPNs) are two common types of virtual private networks used in modern networking. The true statements regarding these VPNs are as follows:

A client-to-site VPN (also known as a remote access VPN) allows remote users to securely connect to a site, as an alternative to dial-up or ISDN connectivity, at a reduced cost.A site-to-site VPN interconnects two locations, as an alternative to a leased line, at a reduced cost.

Therefore, these VPNs provide cost-effective and secure alternatives to traditional connectivity options.

Learn more about Virtual Private Networks

brainly.com/question/30463766

#SPJ11

If I bought mine craft p.e. for 7.99 and hook my Micro soft account up, will i get java edition

Answers

no, they are two diff things
Other Questions
Explain why cold fusion has yet to be solved. Your answer should be 6 or more sentences long. 1. The frequency distributions of the diameters of the copper particles are described in the following table. Size Frequency [2, 6) 10, [6,10) 55,[10, 14) 70, [14, 18) 15, (a) Find the Mean using Frequency distribution (b) Draw the Histogram of size versus relative Frequency. find the equation for a parabola with vertex (-1,4) and directrix y=2 A labor saving device system save $2,000 per year for five (5) years. It can be installed at a cost of $8,000. At the end of the five years it is expected to be sold for $800. The rate of return on this planned investment is most nearly: oIRR 10.4% oIRR = 9.4% O oIRR = 12.4%oIRR-15.4% the secretion of gonadotropins (fsh and lh) will ___________ during menopause. A regulatory agency that protects workers isA. OSHAB. EPAC. FDAD. SECAnswer- A. OSHA 16. An object with a mass of 20.0 kg has a force of 5.0 newtons applied to it. What is the resulting acceleration of the object? What is the voltage across each resistor? Bernard co. has 7% coupon bonds on the market that have 17 years left to maturity. The bonds will make annual payments. If the YTM on these bonds is 9%, what is the current bond price (in $ dollars)? (Assume the face value of the bond is $1,000) $________. How did the Sugar Act and Currency Act reinforce Britains policy of mercantilism? Fatima went to dinner with her parents and spent 12$ in tax.If tax is 8% of the total cost how much was the original bill Brinkley Resources stock has increased significantly over the last five years, selling now for $200 per share. Management feels this price is too high for the average investor and wants to get the price down to a more typical level, which it thinks is $25 per share. What stock split would be required to get to this price, assuming the transaction has no effect on the total market value? Put another way, how many new shares should be given per one old share? -5 2/3 - 1/6 please help The total weight of a cereal box is 19 1/4 ounces nutritional information of the boxes of syrup that one serving is 1 1/2 ounces what is the greatest number of servings provided in this box of cereal What is the 4th form of government? Suppose that in January 2006 Kenneth Cole Productions had sales of $ 524$524 million, EBITDA of $ 56.9$56.9 million, excess cash of $ 108$108 million, $ 6.2$6.2 million of debt, and 1818 million shares outstanding. Use the multiples approach to estimate KCP's value based on the following data from comparable firms: LOADING... . a. Using the average enterprise value to sales multiple in the table above, estimate KCP's share price. b. What range of share prices do you estimate based on the highest and lowest enterprise value to sales multiples in the table above. c. Using the average enterprise value to EBITDA multiple in the table above, estimate KCP's share price. d. What range of share prices do you estimate based on the highest and lowest enterprise value to EBITDA multiples in the table above? Click on the Icon located on the top-right corner of the data table below in order to copy its contents into a spreadsheet.) StartFraction Upper P Over Upper E EndFractionPE StartFraction Price Over Book EndFractionPriceBook StartFraction Enterprise Value Over Sales EndFractionEnterprise ValueSales StartFraction Enterprise Value Over EBITDA EndFractionEnterprise ValueEBITDA Average 15.01 2.84 1.06 8.49 Maximum +51% +186% +106% plus 27 %+27% Minimum negative 42 %42% negative 61 %61% negative 56 %56% negative 22 %22% Which of the following questions would help to shed light on Venus' motives for persecuting Psyche?How does Cupid assist Psyche in her tasks?How does Venus' treatment of Psyche compare to her treatment of Cupid?How could Venus deny Cupid the happiness he feels when he is with Psyche?What tasks did Venus give Psyche to complete? What was the calculated concentration of protein of Serum Specimen A? To receive credit,report the value as a whole number and the units of measure! Han has 410000 in a retirement account that earns 15785 each year. Find the simplest interest Cholesterol is a fatty substance associated with