a chart type useful for illustrating comparisons

Answers

Answer 1

A chart style that works well for comparing similar numbers.

Which chart type is most effective for showing comparisons between different objects when the axis names are lengthy?

Column charts can be used to compare several items or to show how data evolves over time. In column charts, values are typically grouped along the vertical axis and categories along the horizontal axis.

Which graph works best for comparing different types of data?

One of the greatest graphs for comparing two sets of data is a dual axis line chart. The chart's dual y-axis lets you display insights into two different data points. It is simple to see the relationships between two variables of different sizes and measurement scales when using two axes.

To know more about chart type visit:-

https://brainly.com/question/11542857

#SPJ4


Related Questions

sonic communicates with its customers through ____, which is the most popular social networking site in the world.

Answers

sonic communicates with its customers through Faceboook, which is the most popular social networking site in the world.

What do you mean by social networking?

The act of maintaining contact, engaging in conversation, and working together with like-minded people, peers, friends, and family members is known as social networking.

Social networking is the use of social media platforms to engage with current and potential consumers in order to boost sales and grow your business.

Social networks are significant because they enable people to establish contact that might not be possible owing to geographic and temporal separations.

To learn more about social networking, use the link given
https://brainly.com/question/1163631
#SPJ4

Genghis wants to develop a new application that requires a database. He does not, however, want to be responsible for managing the patching and security of the operating system for yet another server. Which of the following would best serve his needs? a. SaaS b. DaaS c. IaaS d. PaaS

Answers

Since Genghis wants to develop a new application that requires a database, the option that would best serve his needs is option a. SaaS.

What are platforms for SaaS?

SaaS, or "Software as a Service," is an acronym. Customers can access their apps remotely using this type of cloud-hosted software, frequently by purchasing a subscription package. The SaaS platform functions as a crucial component of the technical infrastructure in this situation.

Therefore, A software licensing and delivery strategy known as "software as a service" involves centrally hosting software that is subscriber-basedly licensed. On-demand software and Web-based/Web-hosted software are other names for SaaS.

Learn more about SaaS from

https://brainly.com/question/13615203
#SPJ1

write a program that prints out the numbers in the Fibonacci sequence up until the max number. You can figure out the next number in the Fibonacci sequence by adding the two previous numbers.

Answers

The program that prints the numbers of the Fibonacci sequence is given as follows:

int main(){

int second_prev = 0;

int prev = 1;

int max;

int i;

int term;

scanf("%d\n", &max);

printf("%d\n%d\n", second_prev, prev);

for(i = 1; i < max; i++){

term = second_prev+prev;

printf("%d\n", term);

second_prev = prev;

prev = term;

}

return 0;

}

What is the Fibonacci Sequence?

The Fibonacci sequence is a sequence of numbers in which each numbers is obtained as the sum of the previous two numbers.

The first two terms are given as follows:

Zero.One.

The standard notation of a C code is given as follows:

int main(){

return 0;

}

Then the first two terms are the previous terms, declared and printed with the code section inserted (the int declarations) as follows:

int main(){

int second_prev = 0;

int prev = 1;

printf("%d\n%d\n", second_prev, prev);

return 0;

}

Then the max number is read, with the scanf command inserted as follows:

int main(){

int second_prev = 0;

int prev = 1;

int max;

scanf("%d\n", &max);

printf("%d\n%d\n", second_prev, prev);

return 0;

}

Then a for loop is inserted to calculate the missing terms, as follows:

int main(){

int second_prev = 0;

int prev = 1;

int max;

int i;

int term;

scanf("%d\n", &max);

printf("%d\n%d\n", second_prev, prev);

for(i = 1; i < max; i++){

term = second_prev+prev;

printf("%d\n", term);

second_prev = prev;

prev = term;

}

return 0;

}

More can be learned about the Fibonacci sequence at https://brainly.com/question/3324724

#SPJ1

Part A - The method printNums has two parameters: value and numRounds. The method will iterate for numRounds rounds. In each round, random integers between 0 and 9, inclusive, are generated and printed on a single line until value is generated. At that time, value is printed and the round stops. Values for the next round are printed on the next line of output.
For example, a call to printNums(5, 4) could result in the following output. Each round stops when 5 is printed for a total of four rounds.
325
7884465
06165
9678971145
public static void printNums( int value, int numRounds ) {}

Answers

Using the codes in computational language in JAVA it is possible to write a code that method printNums has two parameters: value and numRounds.

Writting the code:

import java.util.Random;

public class PartA {

public static void main(String[] args) {

 

 printNums(5, 4);

 

}

public static void printNums( int value, int numRounds ) {

 

 Random random = new Random();

 for(int i=0 ; i<numRounds ; i++) {

  while(true) {

   int number = random.nextInt(10);

   System.out.print(number);

   if(number == 5)

    break;

  }

  System.out.println();

 }

 

}

}

See more about  JAVA at brainly.com/question/18502436

#SPJ1

Which of the following commands identify switch interfaces as being trunking inter- faces: interfaces that currently operate as VLAN trunks? (Choose two answers.)
a. show interfaces
b. show interfaces switchport
c. show interfaces trunk
d. show trunks

Answers

The following commands identify switch interfaces as being trunking inter- faces: interfaces that currently operate as VLAN trunks is :

b. show interfaces switchport & c. show interfaces trunk

What is a trunked VLAN?We can utilize VLAN trunking, another Ethernet protocol, to get around this scalability restriction. Between switches that handle as many VLANs as necessary, it simply generates one link. At the same time, it also maintains the VLAN traffic distinct, so frames from VLAN 20 won't flow to devices in VLAN 10 and vice-versa. An example might be seen in image 3. You can see that VLAN 10 and VLAN 20 both pass through the trunk link that connects switches 1 and 2.Knowledge of VLAN Trunks. Trunking Overview. A trunk is a point-to-point connection between the interfaces of one or more Ethernet switches and another networking device, like a switch or router. Ethernet trunks carry the traffic of multiple VLANs over a single link, and you can extend the VLANs across an entire network.

Learn more about VLAN trunking refer to :

https://brainly.com/question/29433722

#SPJ4

is a term used to describe how one control loop controls or overrides the instructions of another control loop in order to achieve a desired set point.

Answers

Cascade control is a term used to describe how one control loop controls or overrides the instructions of another control loop in order to achieve a desired set point.

What is a control loop?

For industrial control systems, a control loop serves as the basic building block. It has all the physical parts and control mechanisms required to automatically change a measured process variable's (PV) value to match a desired set-point value (SP). It includes the process sensor, controller function, and final control element (FCE) that are all necessary for automatic control.

The basic building block of industrial control systems is a control loop. It is made up of all the physical parts and control mechanisms required to automatically change the value of a measured process variable (PV) until it is equal to the value of a desired set-point (SP). It contains the process sensor, controller functionality, and final control element (FCE), all of which are necessary for automatic control.

Learn more about control loop

https://brainly.com/question/7423735

#SPJ4

21.1.2: basic inheritance. set course student's last name to smith, age years to 20, and id num to 9999.

Answers

The ID (idNum) is then set to 9999 by course students by using the student data class's setID mutator function.

What is the JAVA program?

The Person Data class's print () function is then invoked using the course student object. There are two print statements in this approach, i.e.

"Name:" + lastname; System.out.print;

Age: ageYears + System.out.print(" Age: ");

So, the output screen displays these two statements. They show the person's name and age, i.e. Smith and 20 are separated by a comma.

The ID must also be displayed after that, thus we use the following phrase: course student.getID() + "ID: "; System.out.println;

The getID accessor method of the Student Data class is used in the print line above in order to obtain the ID and display it on the screen.

Therefore, as a result, the following is the program's output: Smith, 20 years old, has ID 9999.

Learn more about JAVA, here:

https://brainly.com/question/17215486

#SPJ1

Ben, an employee in the legal department, has created several sensitive documents on his computer that must be made available to all members of the executive staff working in the same building. Due to the sensitive nature of these documents, Ben not only wants to restrict access to the files, but also make it impossible for anyone else in the company to even know where they are stored unless specifically told.
Which of the following would MOST likely fulfill Ben's needs?

Answers

There is no option provided, but the thing that would most likely fulfill Ben's needs is administrative share.

Ben, who is a legal department employee, has produced various confidential papers on his computer that must be made accessible to all executive staff members working in the same building. Since these papers are so sensitive, Ben wants to not only limit access to them but also make it difficult for anyone else in the company to know where they are kept unless specifically notified. To fully fulfill all these needs, Ben should use administrative share.

Administrative shares are only accessible to members of local computer administrators group (including the backup operators group). Administrative shares are secret/hidden network shares that are created by the Windows NT family of operating systems and provide remote access to system administrators.

Learn more about record sharing here: brainly.com/question/28064650

#SPJ4

in , two programmers work on the same task on the same computer; one drives while the other navigates.

Answers

Pair programming is a method of software development where two programmers collaborate at the same workstation.

What is pair programming?

The observer or navigator reads each line of code as it is entered while the driver, who is also the code writer, types it in. The two programmers routinely alternate between duties.

One person is the driver and the other is the navigator, and the timer is set for 25 minutes.

Therefore, ask any developer community what they think about pair programming, and you'll get a range of interesting responses.

Learn more about programming, here:

https://brainly.com/question/14190382

#SPJ1

From The Top Of Page Gallery, Insert An Accent Bar 1 Page Number. Close Header And Footer.

Answers

The way to go about the function from From The Top Of Page Gallery are:

On the Insert tab, click.Click the Page Number button in the Header & Footer category.Opens the Page Number menu.Point to Top of Page under Page Number in the menu.The page number formats gallery appears.Select Accent Bar 2 from the gallery.The header includes the pre-formatted word "Page" and the page number.Select the Close Header and Footer button within the Close group.

What exactly do MS Word's header and footer do?

In regards to the difference to a footer, which is text that is positioned at the bottom of a page, a header is text that is positioned at the top of a page. In most cases, this space is used to add document details like the title, chapter heading, page numbers, and creation date.

Therefore, to place a header or a footer in your MS word, Select Page Layout from the View drop-down menu on the Layout tab. The Header & Footer button is located under Page Setup on the Layout tab. By selecting the desired header or footer from the Header or Footer pop-up menu, you can choose from a variety of standard headers or footers.

Learn more about Page Gallery from

https://brainly.com/question/15489395
#SPJ1

Yolanda would like to prevent attackers from using her network as a relay point for a smurf attack. What protocol should she block?
A. Hypertext Transfer Protocol (HTTP)
B. Transmission Control Protocol (TCP)
C. Internet Control Message Protocol (ICMP)
D. User Datagram Protocol (UDP)

Answers

Yolanda would like to prevent attackers from using her network as a relay point for a smurf attack. She should block Internet Control Message Protocol

What is a ICMP protocol?

ICMP is a protocol used at the network level. ICMP messages relay information about network connectivity problems back to the source of the faulty transmission. It sends control messages like "destination network unreachable," "source route failed," and "source quench."

Routers, intermediary devices, and hosts use ICMP to communicate error information or updates to other routers, intermediary devices, and hosts.

Hence to conclude one should block Internet control protocol to prevent from the smurf attack

To know more on ICMP protocol follow this link

https://brainly.com/question/19720584

#SPJ1

when implementing group aba programs, it is important to monitor both processes and .

Answers

When implementing group aba programs, it is important to monitor both processes and outcomes .

What procedure might you use in applied behavior analysis?

The techniques used in applied behavior analysis center on identifying specific behaviors, defining those behaviors, designing interventions to change those behaviors, putting those interventions into practice, evaluating those interventions' efficacy, and either continuing the interventions or creating procedures to maintain them.

If a program achieved its objectives, you can tell from an outcome evaluation. An analysis of the process explains how and why. The services, activities, policies, and procedures of a program are described in a process evaluation.

Therefore, one can say that it is determined whether program activities have been carried out as anticipated through process/implementation evaluation. An evaluation of the program's outcomes or outcome objectives examines the program's effects on the intended population by tracking its progress.

Learn more about processes and outcomes from

https://brainly.com/question/14704067
#SPJ1

black-box testing treats the software unit as a device that has expected input and output behaviors but whose internal workings are known.

Answers

Black-box testing treats the software unit as a device that has expected input and output behaviors but whose internal workings are known is a false statement.

Black box testing is what?

Testing a system in a "black box" is doing so without knowing anything about how it operates within. A tester inputs data and monitors the output produced by the system being tested.

Therefore, The name "black-box testing" refers to the way the system being tested is handled. The term "black box" is an engineering term that refers to a system that transforms a set of defined inputs into a set of defined outputs. You are unaware of what is happening within the system.

Learn more about Black-box testing from

https://brainly.com/question/13262568
#SPJ1

black-box testing treats the software unit as a device that has expected input and output behaviors but whose internal workings are known. true or false

u are working with a database table that contains invoice data. the table includes columns for billing state, billing country, and total. you want to know the average total price for the invoices billed to the state of wisconsin. you decide to use the avg function to find the average total, and use the as command to store the result in a new column called average total. add a statement to your sql query that calculates the average total and stores it in a new column as average total.

Answers

You decide to use the avg function to find the average total, and use the as command to store the result in a new column called average total.

What is invoice?

Fourth is the sum of sum of the invoice totals for each vendor represented as VendorTotal, Fifth is the count of invoices for each vendor represented as VendorCount, Sixth is the average of the invoice totals for each vendor represented as VendorAvg.

The result set should include the individual invoices for each vendor is the reason why we use VendorID in the query.u are working with a database table that contains invoice data. the table includes columns for billing state, billing country, and total. you want to know the average total price for the invoices billed to the state of wisconsin.

Therefore, You decide to use the avg function to find the average total, and use the as command to store the result in a new column called average total.

Learn more about database table on:

https://brainly.com/question/22536427

#SPJ1

Hard disks store and organize files using all the following, except _______.A. tracksB. sectorsC. cylindersD. paths

Answers

Hard disks store and organize files using all the following, except paths. Thus, option D is correct.

What are Hard disks?

Hard disks are flat, round, magnetically-coated platters composed of metal or glass. Laptop hard drives have a storage capacity of terabytes.

The computer's hard disk sometimes referred to as a hard disk or just a hard drive, is an external hard drive that houses various kinds of computer programs and virtual metadata. Its motherboard is protected so that it may be linked to the laptop by power cords thru the hard disks.

On a magnetic hard disk, data is arranged in tracks, which are hexagonal shapes. Therefore, option D is the correct option.

Learn more about Hard disks, here:

https://brainly.com/question/8677984

#SPJ1

You have set up a smart house in packet tracer with many iot devices including a garage door and indoor lights. What happens if you position the cursor on the garage door and select alt + click?.

Answers

Same like the computer setting alt + click helps in shifting the function, which helps in displaying the functions

How is the function of alt +click shifting the function?

1) In a normal key board for a computer the alt+click is nothing but the shift function

2)Alt + click as usually helps in changing the observed functionality

3)Additionally here in the garage door case since many iot devices like indoor doors and lights are present when alt + click is clicked then it helps in displaying all the functions which are available for those devices

Example for shifting the function using alt + click:

1) To turn on /off  the fan,lights,ac as well as the garage door

2)Opens and closes the garage door

Hence to conclude alt + click helps in choosing various options displayed

To know more on iot devices follow this link

https://brainly.com/question/19995128

#SPJ1

consider the statement int list[10][8];. which of the following about list is true? list has 10 rows and 8 columns. list has 8 rows and 10 columns. list has a total of 18 components. list has a total of 108 components.

Answers

The list has 10 rows and 8 columns is true. Therefore, option A is the correct option.

What is a list?

List is a collection data type. It enables multiple values to be stored in a single field. You must set up the List data type in Table Design with each value that the field stores. These values will be available for the field in the table's Datasheet view and in DataPages.

For instance, Allergies in a Patients table might be a List - String data type that is configured with all recognized allergies. A user filling out a New Patients form in an application can choose from the options provided all the allergies that apply to them.

There are three different List data types:

List - String for text values with up to 255 characters.

List - Number for numbers with up to 15 digits.

List - Date for date or date/time values.

Learn more about list

https://brainly.com/question/8992908

#SPJ4

you cannot directly call __str__ method

Answers

Yes! To compute the "informal" or nicely printed string representation of an object, call str(object), format(), and print(). A string object must be the return value.

What does Python's str function do?

The object's string representation is what this method returns. When the print() or str() functions are used on an object, this method is called. The String object must be returned by this method.

What is the call to an object method?

Simply add the method name to an object reference with a '.' (period) in between, then include any arguments in the method's enclosing parentheses to invoke it. Just use empty parentheses if the method doesn't need any arguments.

To know more about string object visit:-

https://brainly.com/question/13017324

#SPJ4

The name of an array, without any brackets, acts as a(n) ______to the starting address of the array.

Answers

The name of an array, without any brackets, acts as a constant pointer to the starting address of the array. It represents the memory location of the first element and allows efficient access and manipulation of array elements.

In programming, an array is a collection of elements of the same data type stored in contiguous memory locations. When an array is declared, the name of the array serves as a constant pointer that points to the memory address of the first element in the array. This memory address is also known as the "starting address" or "base address" of the array.

For example, in C or C++:

```c

int numbers[5] = {1, 2, 3, 4, 5};

```

Here, `numbers` is the name of the array. It represents the starting address of the first element, which is `1`. Since all elements in the array are of the same data type (in this case, integers), the memory locations are contiguous, allowing for efficient access and manipulation of array elements.

Using the array name without brackets in an expression will result in the address of the first element. For instance:

```c

int *ptr = numbers; // 'numbers' is implicitly converted to a pointer to the first element

```

Now, `ptr` holds the address of the first element in the `numbers` array.

When performing arithmetic with the array name or pointer, keep in mind that the size of the data type is considered. For example:

```c

int thirdElement = *(numbers + 2); // Access the value of the third element (3)

```

In this expression, `numbers + 2` calculates the address of the third element, and `*` dereferences that address to access the value.

For more such information on: array

https://brainly.com/question/28565733

#SPJ1

which of the following terms is used to describe the interconnected network of information technology infrastructure users call cyberspace and the people, environment, norms and conditions that influence that network?

Answers

The terminology which is used to describe the interconnected network of information technology infrastructure users call cyberspace and the people, environment, norms and conditions that influence that network is: C. Cyber Ecosystem.

What is cybersecurity?

In Computer technology, cybersecurity can be defined as a preventive practice that is typically used for protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access, especially through the use of technology, frameworks, security policies, processes and network engineers.

What is Cyber Ecosystem?

In Cybersecurity, a Cyber Ecosystem simply refers to a terminology which typically connotes of all of the infrastructure that are associated with an interconnected network of information technology, that are referred to as cyberspace by the end users.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

Complete Question:

Which of the following terms is used to describe the interconnected network of information technology infrastructure users call cyberspace and the people, environment, norms and conditions that influence that network?

Artificial Intelligence

Network Governance

Cyber Ecosystem

Cyber Governance

Cyber Intelligence

A packet analyzer is called a sniffer because
a.) it captures and reads data inside each packet
b.) it starts a denial-of-service attack
c.) it filters out spam
d.) it detects high-speed transmissions

Answers

A packet analyzer is called a sniffer because of option a.) it captures and reads data inside each packet.

Is packet a sniffer?

The process of detecting and observing packet data as it flows over a network is known as packet sniffing. While hackers may use comparable tools for illicit objectives, network administrators utilize packet sniffing tools to monitor and verify network traffic.

Therefore, in the context of the above, a packet sniffer is a piece of hardware or software used to observe network traffic. It is also known as a packet analyzer, protocol analyzer, or network analyzer. Sniffers analyze data packet streams that go between connected computers as well as between connected computers and the greater Internet.

Learn more about packet analyzer from

https://brainly.com/question/25697816
#SPJ1

with this type of key cryptography, the sender and receiver of a message share a single common key.

Answers

It's worth noting that with this sort of key cryptography, the sender and receiver of a message share a single common key - thus the term "symmetric" (Option B)

What precisely is Symmetric Key Cryptography?

The same cryptographic keys are used for both plaintext encryption and ciphertext decoding in symmetric-key techniques. The keys may be the same or there may be a simple transition between them.

The simplicity of symmetric key encryption makes it appealing. Furthermore, because this method is simple and easy to understand, anyone may easily master it. The sole disadvantage is that the receiver must get the sender's secret key.

Learn more bout Cryptography:

https://brainly.com/question/15392550

#SPJ1

Full Question:

With this type of key cryptography, the sender and receiver of a message share a single common key. a.Standard b.Symmetric c.Metric d.Asymmetric

unlike a traditional computer, which operates based on binary on/off states, a FITB computer operates based on many superpositions of states.

Answers

Unlike a traditional computer, which operates based on binary on/off states, a FITB computer operates based on many superpositions of states is false.

What is the computer about?

The traditional computer system takes a set of instructions from a storage device, executes the actions defined in those instructions, and then writes the results to another storage device. This sort of system is often used for batch processing. Data output = f (input data).

Quantum superposition is the foundation of quantum computing. Quantum objects can exist in multiple states or locations at once thanks to superposition. This implies that an object can exist in two states simultaneously and still be a single object.

Therefore, one can say that whereas a traditional computer operates based on binary on/off states, a quantum computer operates based on many superpositions of states.

Learn more about traditional computer from

https://brainly.com/question/28523768
#SPJ1

See full question below

unlike a traditional computer, which operates based on binary on/off states, a FITB computer operates based on many superpositions of states. true or false.

you are troubleshooting a malfunctioning notebook computer system. the user has indicated that the lcd screen suddenly became dark and difficult to read while they were downloading a large file through the wireless network while the system was plugged in at their desk. you have checked the system and determined that the backlight has stopped working. which of the following are the most likely causes? (select two.)

Answers

Since you are troubleshooting a malfunctioning notebook computer system., the options that are the most likely causes are options A and E:

The inverter in the LCD assembly has malfunctioned. The cold cathode fluorescent lamp has burned out and needs to be replaced.

What does "troubleshooting" actually mean?

A methodical method of problem-solving known as troubleshooting is frequently used to identify and resolve problems with sophisticated machinery, electronics, computers, and software systems.


Troubleshooting is a type of problem resolution that is frequently used to fix broken components or operations on a machine or a system. In order to address an issue and get the product or process back in operation, a logical, methodical search for the problem's source is required. It takes troubleshooting to find the symptoms.

To trouble shoot:

Decide on the symptom: Determine the Problem's Type. Locate the trouble spot.Remove unimportant issues: Ensure the proper operating systems, patches, and drivers are installed.Determine the cause: Check the area for common causes.Find a solution: Look for a potential workaround.

Learn more about troubleshooting from

https://brainly.com/question/9572941
#SPJ1

See full question below

You’re troubleshooting a malfunctioning notebook computer system. The user has indicated that the screen suddenly became dark and difficult to read while he was downloading a large file through his wireless network card while the system was plugged in at his desk. You’ve checked the system and determined that the backlight has stopped working. Which of the following could be the cause? (Select Two)

a. The inverter in the LCD assembly has malfunctioned.

b. The wireless network card is emitting radio signals that interfere with the backlight; causing it to stop functioning.

c. The extended download placed high demands on the system DC power; causing the BIOS to shut off the backlight.

d. The AC adapter (brick) is no longer converting AC power to DC power for the backlight.

e. The cold cathode fluorescent lamp has burned out and needs to be replaced.

On which of the following tasks is a 20-year-old most likely to outperform a 70-year-old?A. recalling previously presented nonsense syllablesB. recognizing previously presented foreign language wordsC. recalling previously presented names of citiesD. recognizing previously presented names of fruits and vegetables

Answers

One of the activities in which a 20-year-old is most likely to outperform a 70-year-old is recalling previously delivered meaningless syllables. Option A is correct.

What is the  meaningless syllables?

Any three-letter nonword used in learning and memory research to explore the learning of things that do not already have meaning or links in memory is called as the nonsense syllables.

Hermann Ebbinghaus advocated nonsense syllables consisting of two consonants separated by a vowel as the suitable material to be employed in the experimental research of verbatim-memory, such material being of uniform difficulty, accurately quantifiable, and available in sufficient number.

Therefore, option A is correct.

Learn more about the nonsense syllables, refer to:

https://brainly.com/question/28233426

#SPJ1

Exercise 3.6.7: Odd and Even

The program in this starter code does NOT work as intended. Your job is to find out why and fix the issue.

The program asks the user for two positive integers and will determine if both numbers are odd, if both numbers are even, or if one number is odd and the other number is even. Test and run the program to see how it behaves BEFORE diving into resolving the issue.

Take notes as you work. You'll need to answer the following questions in the free response that follows.

1. What was wrong with the program?

2. What expression was the programmer trying to use that gave the error?

3. How did you resolve the error?

——————————————————————————————————————————

import java.util.Scanner;



public class OddEvenTester

{

public static void main(String[] args)

{

//Ask user to input 2 positive integers

Scanner input = new Scanner(System.in);

System.out.println("Enter 2 positive integers");

int num1 = input.nextInt();

int num2 = input.nextInt();



//Call bothOdd method in OddEven class to determine if both

//numbers are odd

if(OddEven.bothOdd(num1, num2))

{

System.out.println("Both numbers are ODD.");

}



//Call bothEven in the OddEven class to determine if both

//numbers are even

else if(OddEven.bothEven(num1, num2))

{

System.out.println("Both numbers are EVEN.");

}



//Print out that one must be odd and one must be even since

//they are not both odd or both even

else

{

System.out.println("One number is ODD and one number is EVEN.");

}



}

}

——————————————————————————————————————————

public class OddEven

{

// Determines if num1 and num2 are both ODD

public static boolean bothOdd(int n1, int n2)

{

return !(n1 % 2 == 0 || n2 % 2 == 0);

}



// Determines if num1 and num2 are both EVEN

public static boolean bothEven(int n1, int n2)

{

return !(n1 % 2 == 0) && !(n2 % 2 == 0);

}



}

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that asks the user for two positive integers and will determine if both numbers are odd, if both numbers are even, or if one number is odd and the other number is even.

Writting the code:

import java.util.Scanner;

public class OddEvenTester {

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 System.out.println("Enter 2 positive integers");

 int num1 = input.nextInt();

 int num2 = input.nextInt();

 if(OddEven.bothOdd(num1,num2)){

  System.out.println("Both Odd");

 }

 else if(OddEven.bothEven(num1,num2)){

  System.out.println("Both Even");

 }

 else{

  System.out.println("One is Odd and one is Even");

 }

}

}

public class OddEven{

public static boolean bothOdd(int n1,int n2){

 return (n1%2==1 && n2%2==1);

}

public static boolean bothEven(int n1,int n2){

 return (n1%2==0 && n2%2==0);

}

}

See more about JAVA at brainly.com/question/19705654

#SPJ1

hannah has been working for your company for several years. recently, she moved to a new department, which is located on a different floor. after the move, hannah informs you that when she tries to print a microsoft word document (the same program she has always used), the printer on her new floor prints page after page of seemingly random characters. which of the following is the most likely cause of hannah's print problems?

Answers

The wrong print driver has been selected is the most likely cause of hannah's print problems.

What are the common problems of printers?When they run out of paper, ink, or toner, or if the printer senses a problem with the ink or toner cartridge, most printers will cease functioning. When this happens, your printer may display an error message or have blinking green or amber lights.Even though your cartridge is fully charged and ready to go, it can have moved just enough to lose electrical contact with the printer. Simply removing and reinstalling the cartridges is the simplest solution to this possible issue.Find Diagnose & Fix for Windows and Mac computers, then launch it. Open Diagnose & Fix first, then the Smart software. Windows: In the lower left corner, click the Diagnose & Fix icon. macOS: Select the printer you want to fix, go to Printers in the top menu bar, and then select Diagnose & Fix.

Learn more about print problems refer to :

https://brainly.com/question/11172053

#SPJ1

all of the following activities are more difficult on a mobile device than on a desktop computer except:

Answers

All the following activities are more difficult on a mobile device than on a desktop computer, except scrolling. The correct option is a).

What are scrolling screens?

A scrollbar is an interaction technique or widget that allows continuous text, pictures, or other content to be scrolled in a predetermined direction. (up, down, left, or right) on a computer display, window, or viewport so that all of the content, even if only a fraction of the content, can be viewed.

Scrolling is the vertical or horizontal movement of text, images, or video across a monitor or display in computer displays, filmmaking, television production, and other kinetic displays.

Therefore, the correct option is a) scrolling.

To learn more about scrolling screens, refer to the link:

https://brainly.com/question/14052156

#SPJ1

The question is incomplete. Your most probably complete question is given below:

a) scrolling

b) viewing information

c) typing

d) clicking

a chart that is inserted directly in the current worksheet is called a(n) ____ chart.

Answers

A digital medallion is an electronic, encrypted, stamp of authentication on digital information such as e-mail messages, macros, or electronic documents. The given statement is true.

What are the five forms of encryption?

There are five (5) main forms of encryption Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Output Feedback (OFB).

Electronic Code Book (ECB) is the simplest of all of them. Using this method to encrypt information implies dividing a message into two parts to encrypt each block independently. ECB does not hide patterns effectively because the blocks are encrypted using identical plaintexts.

Therefore, A digital medallion is an electronic, encrypted, stamp of authentication on digital information such as e-mail messages, macros, or electronic documents. The given statement is true.

Learn more about  digital medallion on:

https://brainly.com/question/16912819

#SPJ1

which of the options below contains the correct instructions that can be insterted at lines 1-5 in the code above

Answers

The option that contains the correct instructions that can be inserted at lines 1-5 in the code above:

void func(string str1, string str2)

What is code?

Code, also known as source code, refers to text that a computer programmer has written in a programming language. C, C#, C++, Java, Perl, and PHP are some examples of programming languages. Text written in markup or styling languages like HTML and CSS is also referred to as code in less formal contexts. For instance, you might hear people refer to code as "C code," "PHP code," "HTML code," or "CSS code."

A code may make reference to a model number or serial number when describing a hardware identification number. A code in relation to software is the activation code.

Learn more about code

https://brainly.com/question/22654163

#SPJ4

Other Questions
why might citizens choose to join a political party they can vote in a closed primary which of the following is not a step used by cytotoxic t cells to kill infected host cells? view available hint(s)for part e which of the following is not a step used by cytotoxic t cells to kill infected host cells? secretion of perforin secretion of granzyme activation of b cells recognition of infected host cell using its tcr Answer to this question In the picture the following schedule is conflict-serializable. list out at least four equivalent serial schedules for this schedule. you can do this by drawing the precedence graph, and then finding sequences of transactions where all the edges go from left to right. as an example: t1, t2, t3, t4, t5 is clearly not an equivalent serial schedule because there is an edge from t3 to t1 (due to a). The minimum monthly payment for Brian's credit card is 3.5% of his balance or $25, whichever is higher. If Brian's balance at the end of his last billing cycle was $722, what is his minimum monthly payment? I need help im a little confused Gas a and gas b (both unreactive) are allowed to mix. The total pressure is found to be 3. 50 atm. If gas b was measured initially at 1. 25 atm, what is the partial pressure of gas a?. Assume that the US makes only burgers. In 2010, the US made and sold 1 billion burgers at a price of $2 each. In 2011, the price of burgers is $2.50. The year 2011 is selected as the base year. In 2010, real GDP is $___ billion. What lies is at the heart of the allocation of goods and services in a free-market economy? What are some of the examples of government regulating the economy? Response-blocking that is used as an intervention to prevent minor forms of escape, is what kind of function-based intervention?Group of answer choicesConsequence-based intervention for escape-maintained behaviorAntecedent-based intervention for escape-maintained behaviorConsequence-based intervention for attention-maintained behaviorAntecedent-based intervention for attention-maintained behaviorConsequence-based intervention for tangible/activity-maintained behaviorAntecedent-based intervention for tangible/activity-maintained behaviorQuestion 7__________________ is disabling the function of problem behavior while enabling the function of the appropriate replacement behavior.Group of answer choicesMO-manipulationReverse PremackingPremackingConditional probabilityExtinctionQuestion 8Functional communication training is an application of this procedure:Group of answer choicesDRADRODRLDPADPHQuestion 9What strategic approach(es) can a FBA intervention consist of?Group of answer choicesTeaching alternative behaviorsAltering antecedent variablesTeaching reinforcement strategiesAltering consequent variablesa, b, and d onlyb, c and d onlyall of the aboveQuestion 10Alternative appropriate behaviors that serve the same function for an individual:Group of answer choicesAlways involve skills the individual already possessesProduce the same reinforcer for the individualHave the same topography as the problem behaviorAlways require the same amount of response effort as the problem behaviorQuestion 11Under what conditions might one use sensory-extinction as a consequence-based intervention to treat behaviors maintained by automatic reinforcement?Group of answer choicesWhen the reinforcer is known and access can be preventedCreating an adequate time between responses to teach new skillTo decrease or eliminate severe problem behavior, such as SIBIf staff cannot prevent access to stimulationAll of the above What does the practice of selective incorporation mean? true or false: brands are sold either under a common/family name or as an individual brand. Why do you think Ramses signed the treaty If a company uses the direct write-off method of accounting for bad debts,a. It is applying the matching principle.b. It will record bad debt expense only when an account is determined to be uncollectible.c. It will reduce the accounts receivable account at the end of the accounting period for estimated uncollectible accounts.d. It will report accounts receivable in the balance sheet at their net realizable value. Place the following organs in the appropriate body cavity. What type of rhetorical appeal does the author use in this passage? shall not see on earth a place more dear,though I have been detained long by Calypso,loveliest among goddesses, who held mein her smooth caves, to be her heart's delight,as Circe of Aeaea, the enchantress,desired me, and detained me in her hall.But in my heart I never gave consent.Where shall a man find sweetness to surpasshis own home and his parents? In far landshe shall not, though he find a house of gold.What does this excerpt most suggest about the values of the ancient Greeks?They valued beauty.They valued family.They valued wealth.They valued wisdom. Vivi needs to solve the system of equations below using elimination.4 + 6y =-14- +3y=-10Which correctly describes a possible first step Vivi could take?D. Multiply each term in the 2nd equation by 2.b. Multiply each term in the 2nd equation by -4.C. Multiply each term in the 2nd equation by 4.d. Both a and c could work. use strong induction to show that every positive integer can be written as a sum of distinct powers of two, that is, as a sum of a subset of the integers 20