answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
2 years ago
3

Given that ph refers to a float, write a statement that compares ph to 7.0 and makes the following assignments (RESPECTIVELY!) t

o the variables neutral, base, and acid:
0,0,1 if ph is less than 7
0,1,0 if ph is greater than 7
1,0,0 if ph is equal to 7
Computers and Technology
1 answer:
Harrizon [31]2 years ago
4 0

Answer:

public class TestClock {

   public static void main(String[] args) {

   float pH=7.0;

   int neutral, base,acid;

   if(pH <7){

       neutral=0;

       base=0;

       acid=1;

   }

   else if(pH==7){

       neutral=1;

       base=0;

       acid=0;

   }

   else if(pH>7){

       neutral=0;

       base=1;

       acid=0;

   }

   }

}

Explanation:

Above is the solution to the problem implemented with Java programming language

  1. Create a variable called pH and initialize it (Note your code can also prompt a user to enter a value for this variable.
  2. Use if/elseif statements to check for the conditions as given in the questions and do all assignments as required

You might be interested in
3. Personal Trainer is very concerned about the security and protection of the information they collect in the new information s
Sever21 [200]

Answer:

Check the explanation

Explanation:

in order to make sure that the built into the new systems, the below input and output levels of security control have to be considered for personal trainers staff.

There are:

   Network Security

   Application security

   Physical security

   User security

   File security

   Procedural security

These securities levels are consistent and advantage in building the decisions regarding system security.

There are the following policies applied to each control:

Network Security: Network interface and traffic controlling, encryption of data.

Application Security: Verification of data input/output and update of software proceedings.

Physical Security: Security to servers, computers and physical environment.

User Security: Protection passwords and identify management skills.

File Security: Access Permission allocated to users and editing authorizations given to users.

Procedural Security: Certify safety protection to perform decision-making activities and document shredders.

Finally, consider another main point is depends the new system performance are system response time, throughput, bandwidth time and turnaround time.

7 0
2 years ago
At which stage should James, a website designer, gather information about the website he wants to create, and at which stage sho
viva [34]
<h2>Answer: James should gather information in the <u><em>Learning</em></u> phase and begin the site’s coding in the <u><em>Development</em></u> phase.</h2>

8 0
2 years ago
The ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms
strojnjashka [21]

The answer in the space provided is the Diffie-Hellman Key Exchange. This is entitled to be the first published key algorithm in which has a limit in which the exchange occurs in secret values and that its purpose was to enable two users to have an exchange of key in a secure manner in means of using it for a subsequent symmetric encryption in terms of messages.

7 0
2 years ago
A vehicle fails an HC emission test at idle and 2,500 rpm, and the engine has an acceleration stumble. The heated oxygen sensor
Natalija [7]

I would say a defective O2 sensor

6 0
2 years ago
What is the Gain (dB) of a transmission if the Maximum Data Rate is 1 Gbps and the Bandwidth =7000 MHz? Group of answer choices
denpristay [2]

Answer:

15.420 dB

Explanation:

the Gain (dB) of a transmission if the Maximum Data Rate is 1 Gbps and the Bandwidth =7000 MHz is 15.420 dB.

3 0
2 years ago
Other questions:
  • What are the possible consequences if you fail to identify system requirements correctly and completely?
    9·1 answer
  • A(n) _____ is the highest educational degree available at a community college. master bachelor associate specialist
    13·2 answers
  • Which feature of Badoo helped members make their profile more prominent?
    14·1 answer
  • Letitia is in high school. She wants to go to medical school in Kentucky and then become a pediatric surgeon to help children. W
    5·2 answers
  • The most direct way for Jonathan to gain on-the-job experience and earn money while attending school is to apply for:
    5·2 answers
  • C++ :Write a program that simulates flipping a coin to make decisions. The input is how many decisions are needed, and the outpu
    13·1 answer
  • As a digital investigator for your local sheriff’s department, you have been asked to go with a detective to a local school that
    13·1 answer
  • Create the strAnalysis() function that takes 1 string argument and returns a string message. The message will be an analysis of
    15·1 answer
  • Given positive integer numInsects, write a while loop that prints that number doubled without reaching 200. Follow each number w
    14·1 answer
  • Connie works for a medium-sized manufacturing firm. She keeps the operating systems up-to-date, ensures that memory and disk sto
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!