URGENT ASAP please 20 POINTS Thanks
Write a Java program named MathPow.java that calculates the squares and cubes of the numbers from 0 to 10 and prints the resulting values in a table format, as shown below. Hint: use \t for columns.

URGENT ASAP Please 20 POINTS ThanksWrite A Java Program Named MathPow.java That Calculates The Squares

Answers

Answer 1

Answer:

i don't see them

Explanation:

i don't see them


Related Questions

At the settings window, the app buttons below the background thumbnails are used to change the
Select one:
a. image options for the Lock screen,
b. apps that appear on the Start menu.
c. screen saver settings.
d. apps that give notifications on the Lock screen image.

Answers

b because usually when you start a game it says it

In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in various security problems.
a) What are two such problems?
1. One user can read the private data of another user - privacy.
2. One user can corrupt the private data of another user - integrity.
3. One user can prevent another user from getting anything done - denail of service.
b) Can we ensure the same degree of security in a time-shared machine as we have in a dedicated machine? Explain your answer.
There are two answers, either one correct.
a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing, and fairly shares the computer, then we can achieve the same level of security.
b. No - we can never be sure that our software doesn't have bugs, so we can never be sure that we prevent all sharing of data and fairly allocate computer resources.

Answers

Explanation:

a.

One user can read the private data of another user-privacy.One user can prevent another user from getting anything done-denial of service.

Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.

b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.

Write a program using python 3 that asks the user how many integers they would like to enter. You can assume that this initial input will be an integer >= 1. The program will then prompt the user to enter that many integers. After all the numbers have been entered, the program should display the largest and smallest of those numbers (no, you cannot use lists but you can use loops, if statements, comparison & logical operators). Your code should work correctly no matter what integers the user enters. When you run your program it should match the following format:

How many integers would you like to enter?
4
Please enter 4 integers.
-4
105
2
-7
min: -7
max: 105

Answers

I've included my code in the picture below. Best of luck.

1. Which of the following cables are used in networking? Check all that apply.
a HDMI cable
b. Ethernet
C. Auxiliary cable
d. Fiber optic cable

Answers

Answer:

ethernet and HDMI for sure those 2

Explanation:

^

Write a recursive function to determine if a number is prime.

Answers

Answer:

Follows are the code to find the prime number:

import java.util.*;//import package for user input  

public class Main//defining a class

{  

public static boolean Prime(int x, int j)//defining a method isPrime    

   {  

       if (x<= 2) //use if block to check x less than equal to 2

           return (x== 2) ? true : false; //use bitwise operator to return value  

       if (x%j == 0) //use if to check x%j equal to 0

           return false;//return false value  

       if (j*j > x)//defining if that check i square value greater than n  

           return true; //return true value

       return Prime(x, j+1); //callling recursive method

   }  

   public static void main(String[] as)//main method  

   {  

       int n; //defining integer variable

       Scanner oxc=new Scanner(System.in);//creating Scanner class object

       n=oxc.nextInt();//input value

       if (Prime(n, 2))  //use if block to call isPrime method

           System.out.println("Yes"); //print value  

       else //else block

           System.out.println("No");  //print value  

   }  

}  

Output:

5

Yes

Explanation:

In this code, a static boolean method "Prime" is declared, that accepts two integer variables in its parameter and defines the if block that checks the prime number condition by the recursive method and returns a value true or false. Inside, the main method an integer variable is declared that uses the Scanner class object for input value and passes into the method and prints its value.

Assume that a file containing a series of integers is named numbers.txt. Write a program that calculates the average of all the numbers stored in the file. The input file may have numbers all on one line or several lines or one number on each line.

Answers

Answer:

Program in Python:

file = open("numbers.txt", "r")

count = 0

isum = 0

content = file.readlines()

for nums in content:

    num = nums.rstrip('\n').split(" ")

         for i in num:

              isum= isum + int(i)

              count = count + 1

print("Average: "+str(isum/count))

Explanation:

This line opens the file named numbers.txt

file = open("numbers.txt", "r")

This line initializes num to 0

count = 0

This line initializes sum to 0

isum = 0

This line reads the content of the opened file file

content = file.readlines()

This iterates through the content of the file

for nums in content:

This removes trailing new lines and blank spaces from each number

    num = nums.rstrip('\n').split(" ")

This also iterates through the content of the file

         for i in num:

This calculates the sum of the numbers in the file

              isum= isum + int(i)

This counts the numbers in the file

              count = count + 1

This calculates and prints the average of the numbers

print("Average: "+str(isum/count))

The program reads in a series of integer values from a text file and calculates the average of the values. The program is written in python 3 thus ;

with open("numbers.txt", 'r') as file :

#opens the file in read mode

content = file.readlines()

#reads in the contents of the file at once into a list

count = 0

#initialize counter

sum = 0

#initialize the sum of the integers

for line in content:

#loop through each line in the content list

num = line.rstrip("\n").split()

#removes the newline and splits the values based on whitespace

for val in num :

#loops through the list

count+=1

#increase count by one for every iteration

sum+=int(val)

#takes the Cummulative sum

print("average =", int(sum/count))

Learn more : https://brainly.com/question/20308959

Which steps are needed for Word to create an Index? Select two options.

Mark entry.
Make a list of entries.
Insert Index.
Insert Table of Contents.
Insert Footnotes.

Answers

Answer:

A: Mark Entry

C: Insert Index

Explanation:

It includes Mark an Entry and Insert Index.

Index in Microsoft Word is used to list the terms or topics which are in the document as well as the pages they appear.

The steps to create an Index are:

You should place the insertion point where you want the index tab to appear.At top of the bar, you should click References tab, click Index group, click Insert Index. Then, the Index dialog box will appears.With the click of Ok, the Index will appears at the insertion point.

In conclusion, the two options includes Mark an Entry and Insert Index.

Read more on this here

brainly.com/question/17864103

Write a program with total change amount as an integer input, and output the change using the fewest coins, one coin type per line. The coin types are Dollars, Quarters, Dimes, Nickels, and Pennies. Use singular and plural coin names as appropriate, like 1 Penny vs. 2 Pennies.
If input is 0 or less, output is 'No Change'
For Example: Input: 45
Output:
1 Quarter
2 Dimes
input_val = int(input())
if input_val <= 0:
print('No change')
else:
num_dollars == input_val // 100
input_val %= 100
num_quarters == input_val // 25
input_val %= 25
num_dimes == input_val // 10
input_val %= 10
num_nickels == input_val // 5
input_val %= 5
num_pennies == input_val
if num_dollars > 1:
print('%d dollars' % num_dollars)
elif num_dollars ==1:
print('%d dollar' % num_dollars)
if num_quarters > 1:
print('%d quarters' % num_quarters)
elif num_quarters ==1:
print('%d quarter' % num_quarters)
if num_dimes >1:
print('%d dimes' % num_dimes)
elif num_dimes ==1:
print('%d dime' % num_dimes)
if num_nickels >1:
print('%d nickels' % num_nickels)
elif num_nickels ==1:
print('%d nickel' % num_nickels)
if num_pennies >1:
print('%d pennies' % num_pennies)
elif num_pennies ==1:
print('%d penny' % num_pennies)

Answers

Answer:

b ,/knlk

Explanation:

In what order should these be completed?
1.Open case cover
2.Unplug computer
3.Clip ESD strap to case
4.Power down system
5.Press and hold power button
6.Back up data

Answers

It goes like 4,2,1,3,5,6

What are two strategies a Product Owner can use during Program Increment Planning to minimize dependencies?

Answers

Answer:

1. Split Stories to eliminate dependencies;

2. Move Stories on their team's backlog to another team;

Explanation:

There are two established strategies a Product Owner can use during Program Increment Planning to minimize dependencies. These includes

1. Split Stories to eliminate dependencies; this help to define the different story for the Team backlog and thereby making others understand it in simple terms.

2. Move Stories on their team's backlog to another team;

Which of the following terms best describes the process of suppressing complex details of a system and presenting a simplified version with just the relevant details?

a. Creativity
b. Free Thinking
c. Abstraction
d. Programming

Answers

I believe the answer is C.
Abstraction.

Hope this helps!

Answer: Abstraction

Explanation: Abstraction could simply be explained as an art of giving a general, concise and yet reasonable overview or summary of a rather bulky or voluminous assignment, project Or system. It is composed of key scenes or steps involved in a complex or huge build up in other make a simple and understandable version of the same project albeit exempting in depth explanation and analysis. Abstraction technique is used in making abstract segment of various projects which is a segment of a writeup or research where the summary of the entire project is being outlined.

Who is responsible for maintaining, monitoring, and analyzing database security at the back end?
The _________
works on the back end and is responsible for maintaining, monitoring, and analyzing database security
database.

Answers

Answer:

back end developer?

Explanation:

     

pls need help pls pls

Answers

its answer is listen to

PLEASE HELP!!! WILLGIVE BRAINLIEST!!!
By using an understanding of subtractive color, why do black cars left outside in a sunny day get hotter faster than white cars?

Answers

Black absorbs all visible parts of the spectrum turning that light energy into heat. The more it absorbs the more heat it emits.
Black objects absorb radiations/ heat instead of reflecting them.

Question # 2 Multiple Choice The _____ method returns an integer between the two provided numbers. It can take the value of either of the provided numbers. seed randint random range

Answers

Answer:

randint

Explanation:

Answer:

randint

Explanation:

ed 2021

What can a user do using the Contact Group dialog box? Check all that apply.

name a group
add members to a group
vote on items
remove members
plan meetings
block other groups
email a group

Answers

Answer:

1,2,4,5,7

Explanation:

Had the question

Answer:

a b d e g

Explanation:

While setting up a computer on the network, you use 'ipconfig' and see that the IP address is currently 10.24.16.160, with subnet mask 255.255.255.192. Where did the IP address likely come from?

Answers

Answer:

Explanation:

The IP address either came from your router or your Internet Service Provider (ISP). Sometimes ISP's automatically assign every device under their network an IP address, while other times they allow each individual's home network router to determine the IP of every connected device. This router can either assign an automatic IP address to each device from a range of addresses or the IP address can be assigned manually to each device as static.

A loop that will output only the names that come before "Thor" in the alphabet from the names list.

Answers

names = ["Kevin", "Joe", "Thor", "Adam", "Zoe"]

names.sort()

for x in names:

   if x == "Thor":

       break

   else:

       print(x)

I made up my own names for the sake of testing my code. I wrote my code in python 3.8. I hope this helps.

A loop that will output only the names that come before "Thor" in the alphabet from the names list is written below:

What is a loop?

A loop is a set of instructions in computer programming languages that repeatedly repeats itself until a given condition is met.

The time it takes to determine the number of times the loop iterates before the loop executes is the difference between the decorative and extensive program loops.

If a loop's block of code is to be repeated until the provided condition turns false, and this condition is tested before the block is run, the loop is said to be a pretest.

names = ["Kevin", "Joe", "Thor", "Adam", "Zoe"]

names.sort()

for x in names:

  if x == "Thor":

      break

  else:

      print(x)

Therefore, the loop is written or coded above.

To learn more about the loop, refer to the link:

https://brainly.com/question/25955539

#SPJ2

Read three integers from user input. Then, print the product of those integers. Ex: If input is 235, output is 30. Note: Our system will run your program several times, automatically providing different input values each time, to ensure your program works for any input values.
1 first-2
2 second-3
3 third=5
4 s=int(first second third)
5 print(s)

Answers

Answer:

The program in Python is as follows:

first = int(input())

second = int(input())

third = int(input())

s = first * second * third

print(s)

Explanation:

This prompts the user for first input

first = int(input())

This prompts user for second input

second = int(input())

This prompts user for third input

third = int(input())

This calculates the product

s = first * second * third

This prints the calculated product

print(s)

SQL allows the use of special operators in conjunction with the WHERE clause. A special operator used to check whether an attribute value matches a value contained within a subset of listed values is ____. Question 20 options: BETWEEN IS NULL LIKE IN

Answers

Answer:

LIKE.

Explanation:

A structured query language (SQL) can be defined as a domain-specific language designed and developed for managing the various data saved in a relational or structured database.

In Computer programming, any word restricted for use, only in object names because they belong to the SQL programming language are called reserved word.

Hence, these reserved words can only be used as the name of an object but not as an identifier e.g the name of a function, label or variable.

Some examples of reserved words in structured query language (SQL) are UPDATE, GROUP, CURRENT_USER, CURRENT_DATE, CREATE, DELETE etc.

Hence, SQL allows the use of special operators in conjunction with the WHERE clause. A special operator used to check whether an attribute value matches a value contained within a subset of listed values is LIKE.

Consider the following method, which is intended to return an array of integers that contains the elements of the parameter arr arranged in reverse order. For example array containing (-5, 3, 2, 7) then a new array (-5, 3, 2, 7) contains should be returned and the parameter are should be left unchanged .

public static int[] reverse(int) arr)
Intl new new intarr.length);
for (int k = 0; K arr.length: )
* Bissing statement / return newer;

Write down the statements that can be used to replace / Missing statement so that the method works as intended?

Answers

Code:

public static int[] reverse(int [] arr){

Int [] newArr = new int[arr.length];

for (int k = 0; k<arr.length;k++){

/*Missing statement */

}

return newArr;

Answer:

Replace the comment with:

newArr[k] = arr[arr.length-k];

Explanation:

Required

Complete the code

In the given code:

The first line of the given code defines the method

public static int[] reverse(int [] arr){

The next line declares array newArr withe same length as array arr

Int [] newArr = new int[arr.length];

The next line iterates through the elements of array arr

for (int k = 0; k<arr.length;k++){

The /* Missing statement */ is then replaced with:

newArr[k] = arr[arr.length-k];

The above statement gets the elements of array arr in reversed order.

This is so because, as the iteration iterates through array arr in ascending order, arr.length-k gets the element in reversed order

Mobile cameras are now of a higher quality than when they first arrived on the market. Describe the difference in
resolution that has come about and how that has led to higher photo quality.

Answers

Answer:

When mobile cameras first arrived on the market, they did not have a high-quality resolution. But after the years, mobile cameras are able to record a significant amount of digital information.

You have booted a new computer (purchased from a manufacture) to PowerShell prior to the computer starting the Out-of-Box Experience. From PowerShell, you run the Set-ExecutionPolicy Unrestricted cmdlet. What is the function of this cmdlet?

Answers

Answer:

It allows Windows to run script files.

Explanation:

A cmdlet is an abbreviation for command-let and it is a special type of lightweight command that is typically used with the Microsoft Windows PowerShell script for the automatic performance of a single-specific function on a computer system.

In this scenario, you have booted a new computer (purchased from a manufacture) to PowerShell prior to the computer starting the Out-of-Box Experience. From PowerShell, you run the Set-ExecutionPolicy Unrestricted cmdlet. Thus, the function of this cmdlet is to allow Windows run script files known as scripts which have been typed into the command line.

Complete the sentence about entering and editing data in a cell in a spreadsheet.

To enter data in a cell in a spreadsheet (1, select the cell, click and start typing.2, select the cell and right click to bring up options.3, select the row that contains the cell and use the insert tool.) To overwrite data in a cell(1, select the cell, click and start typing.2, select the cell and right click to bring up actions.3, select the row that contains the cell and use the insert tool)

Answers

Answer:

1. Select the cell, click and start typing

2. Select the cell, click and start typing

Explanation:

To enter data in a cell in a spreadsheet, select the cell, click and start typing.

To overwrite data in a cell, select the cell, click and start typing.

A spreadsheet is an application that is used for entering, organizing, analyzing, interpreting and storing data. It a relatively simple application and an example is Microsoft Excel. The easiest way to enter data into a spreadsheet is to select the cell, click and start typing. Overwriting an already existing data can be done in the same manner in which data is entered into a cell - selecting the cell, clicking and start typing.

To enter data in a cell in a spreadsheet, select the cell, click, and start typing.  To overwrite data in a cell, select the cell, click, and start typing. The correct options are 1 and 1 respectively.

To enter data into a spreadsheet cell, first select the required cell by clicking on it. Once you've made your selection, you may begin typing immediately into the cell.

You can enter numbers, text, or formulae into the column for additional computations or data organisation. To erase data in a cell, however, repeat the procedure of choosing the cell by clicking on it.

As you begin inputting new information, the prior material within the cell will be highlighted and replaced.

This makes it simple to modify and update data within spreadsheet cells, assuring accuracy and flexibility in data management.

Thus, the correct options are 1 and 1 respectively.

For more details regarding spreadsheet, visit:

https://brainly.com/question/31511720

#SPJ6

-(-13) P binary using signed. 2's complement representation
Perform the arithmetic operations (+42) + (-13) and (-42)
negative .
Consider the balloon​

Answers

Answer:

00011101

00011101

Explanation:

Given the following arithmetic operations

a)   (+42) + (-13)

b)   (-42) - (-13)

From (a):

We need to convert +42 into binary, so we get = 00101010

Now for +13, when it is converted into binary, we get = 00001101

But, here, the 13 is negative. So, here is what we will do, we will have to take the two compliment of the binary. After doing that, we get = 111110011

+ 42     →     00101010

- 13      →     1 1 1 10011

+29             000 11101  

Thus, the arithmetic operation after we use 2's complement is 00011101

b)

Here both 42 and 13 are negative. Using two complement representation

-42 is first converted to binary as 00101010, Then → 11010101 + 1 = 11010110

-13 is converted to binary as 00001101 → 11110010 = 11110011

In between, a negative sign exists, so we take another 2's complement.

i.e.

11110011 → 00001100 + 1 = 00001101

- 42 →     1 1 01 0110

+13  →     00001 101

-29         1 1 1 00011

since there is no carry, we take two's complements for the result as:

1 1 1 00011 →00011100 + 1 = 00011101

Explain briefly what would happen if marketing research is not conducted before a product is developed and produced for sale.

Answers

Answer:

Neglecting to do market research can result in indecision and inaction, fear of risk or the truth, and/or too many options, which can lead to paralysis. When launching a new product, effective market research will help you narrow down your true market potential and your most likely customers.

Explanation:

A customer is looking for a storage archival solution for 1,000 TB of data. The customer requires that the solution be durable and data be available within a few hours of requesting it, but not exceeding a day. The solution should be as cost-effective as possible. To meet security compliance policies, data must be encrypted at rest. The customer expects they will need to fetch the data two times in a year. Which storage solution should a Solutions Architect recommend to meet these requirements

Answers

Incomplete question. The options;

A. Copy data to Amazon S3 buckets by using server-side encryption. Move data to Amazon S3 to reduce redundancy storage (RRS).

B. Copy data to encrypted Amazon EBS volumes, then store data into Amazon S3.

C. Copy each object into a separate Amazon Glacier vault and let Amazon Glacier take care of encryption.

D. Copy data to Amazon S3 with server-side encryption. Configure lifecycle management policies to move data to Amazon Glacier after 0 days.

Answer:

D. Copy data to Amazon S3 with server-side encryption. Configure lifecycle management policies to move data to Amazon Glacier after 0 days.

Explanation:

Note, the Amazon S3 (Amazon Simple Storage Service) is a cloud storage service that is both durable, cost-effective, and secure. Since the customer wants a storage space of up to 1,000 TB (terra bytes), this makes the Amazon S3 solution the most recommended solution.

The process begins by copying the data to Amazon S3 with server-side encryption. Next, set-up the configuration of lifecycle management policies to move data to Amazon Glacier after 0 days.

Mary is working on joining of a new domain tree to an existing forest, but before starting the process, she should have at least some number of other domains present. What will be the number of those domains?

Answers

Answer:

One.

Explanation:

When two or more domains (trees) not sharing a contiguous namespace are joined together, a forest would be formed.

This ultimately implies that, a forest is formed by joining two or more independent domains having non-contiguous namespaces are joined together.

For instance, joining brainly1.com and brainly2.com would result in a forest i.e a single Active Directory environment.

In this scenario, Mary is working on joining of a new domain tree to an existing forest. Before starting the process, she should have at least one domains present. This single domain is typically known as the root domain.

Hence, joining a new domain tree to an existing forest requires that a user must have at least one domains present.

Question # 2 Multiple Select You wrote a program to compare the portion of drivers who were on the phone. Which statements are true? Select 4 options. Even when confident that the mathematical calculations are correct, you still need to be careful about how you interpret the results. Your program compared an equal number of male and female drivers. You could modify the program to allow the user to enter the data. It is important to test your program with a small enough set of data that you can know what the result should be. A different set of observations might result in a larger portion of male drivers being on the phone

Answers

Answer:

3,5,4,1

Explanation:

Edge 2020

Twenty years ago, most games were sold in brick and mortar stores. How did independent game developers get their games into these stores?

Question 18 options:

by working with a crowdfunding specialist who would give developers funds to offer to retailers if they promised to sell the game


by working with a piracy specialist who would ensure the game was distributed to each and every retailer, regardless of licensing


by working with a retail specialist who distributed video games to consumers


by working with a publisher who would help the developer bring their games to stores and then market them and get as much exposure and traction as possible

Answers

Answer: by working with a publisher who would help the developer bring their games to stores and then market them and get as much exposure and traction as possible

Explanation:

Publishers were and are still important in the gaming world even if they have now increasingly moved online. Publishers have a reputation and with this reputation comes access to a wide array of services that enable them to sell games.

This was the same when most stores were brick and mortar. One would sign a deal with a publisher who through their expertise would help the game get to market and give it publicity so that it can be sold.

Other Questions
When a number is increased by 35, the result is 38. What equation fits this statement X+5y=-23X-y=1Solve by elemination how did frederick douglass respond to lincoln's death how was our constitution set up to ensure we have a "limited government " how did thutmose 3 lose his power as pharaoh? The game was Scheduled for the weekend. Depending on the weather. noah made dinner for his family. the main dish cost $6.85, the salad cost 3.62, the dessert cost 6.98. if there are 5 people in Noah's family how much did the dinner cost per person Gina can write 3 pages per hour. Emily can write 5 pages per hour. If they both write for x number of hours, how many pages will they write altogether? *x (3 + 5)x (4 + 4)3 (x + 5)5 (3 + x) Help ( I give Brainly crowns)its not that complicated thanks !!! Please answer/do!! In a hurrywill name the brainliest An economic principle states that the lower the price of a product, the greater the quantity consumers will wish to purchase. This principle is based on the critical assumption that What comfort might his brother take from Rama's words? Part A Which statement best reflects the theme of the poem? A. Dreaming occurs during sleep time. B. Dreaming allows wishes to be fulfilled. Dreaming only occurs at night. D. Dreaming is a way to relive childhood. Identify and describe each example of Michelangelos art How do I round up 12,853 to the largest place value What is the proper value for C in the above table.A. 28B. 30C. 32D. 65 HELP FRENCH! Faites des phrases au present a l'aide des elements donnes.1) Payer tout / a l'avance / ils2) Aller avec eux / dans un pays francophone, chauque annee / je3) Faire / la veille/ nos valises / nous Are the lines parallel? y=4x+4 and y=-4x-2 Samuel, a quality assurance inspector at a donut factory, checks for product quality using a random sample of 7 donuts from a batch of 38, with 14 cake donuts and 24 glazed donuts. Let p be the proportion of cake donuts in the sample.Part A: Is the 10% condition met in this case? Justify your answer.Part B: Is the Normal condition met in this case? Justify your answer. 9. Give at least 2 examples of Tom Hank's determination to portray his characters accurately.