Write the line that declares a two-dimensional array of strings named chessboard. that is, how would i declare a two-dimension array of strings that is called chessboard? you would declare a string array by

Answers

Answer 1

Answer:

String chessboard[][]=new String[6][6];

Explanation:

This is the declaration of a string 2-D array in java.

String is the data type of the variable.

chessboard is the name of the variable.

6 is the size of the 2-D array.

new is the keyword for allocating  space to array.


Related Questions

Which of the following is a negative impact of technology on society

Answers

Modern technology has absolute control over our lives. Nowadays we work, love, shop, play and communicate with each other and the world online. We have embraced advanced technology, seeking only the benefits and completely ignoring the downfalls. The social impact of technology is huge because today we spend more time online than ever before and the Internet plays a key role in various areas of our lives. There’s no doubt that modern technology has facilitated our lives and our communication with the world, but it also has many visible flaws.

Final answer:

The negative impacts of technology on society include the digital divide, job losses due to automation, loss of privacy, social and mental health challenges, and an over-reliance on technology that could potentially lead to a loss of humanity.

Explanation:

One negative impact of technology on society is the phenomenon known as the digital divide, which highlights the increasing gap between those who have access to technology and those who do not. This divide occurs both locally and globally, exacerbating issues of inequality.

Furthermore, technology's rapid evolution leads to significant job losses in traditional sectors such as manufacturing and retail due to automation and digitalization, as seen in the decline of companies like Kodak and the closure of record stores with the rise of online music shopping.

Another critical concern is the loss of privacy and control over personal data due to the pervasive use of social media and internet services, putting individuals at risk of cyber threats like hacking, identity theft, and online predatory behavior.

Moreover, the sociological impact of disruptive technology can lead to a variety of social and mental health challenges, such as the negative influences from social media, violent video games, and the pressure to always be connected, which can lead to a decline in face-to-face social interactions and an increase in loneliness and social isolation.

Additionally, there's a fear of loss of humanity and over-reliance on technology for essential functions, which can have profound effects on our culture and way of relating to the world.

The kidneys prevent your body from losing too much water.

True
False

Answers

I think this is true. Hope this helps! ☺

The answer is true.

A mobile browser will interpret a _____ event as a tap event in which a user taps a page object.â

Answers

The answer is hover.

Answer:

hover event

Explanation:

A hover can be seen and practiced using a web browser because it is usually carried out when a mouse is hovered across an event. the hovering automatically triggers an action and this is possible if the effect and been coded into the web page.

however in mobile browsers this effect cannot work efficiently because it causes buttons to be stuck and the hovered area will have to be tapped for the action to be triggered. hence the hover event is now recognized as a tap event on a mobile browser. this is what makes hovering in mobile browsers to be considered a difficult event

_____ check to see what links are on the user's web page and make sure they work; if a link is broken, they identify it and include this information as part of the data about that page.

a. backdoors

b. subscribers

c. clients

d. crawlers

Answers


The answer is D, crawlers!

Answer:

d. crawlers

Explanation:

Crawlers or spider web

It is an automated software that systematically inspects and tracks all Internet pages to index and position them in the search engine.

The Web Spider starts with a few initial URL’s, called web seed and goes discovering the web pages linked to our website and tracking them.

Collect and add URLs to the list to process and index them later.

The Cwarler uses the robots.txt file and the meta tag to collect the information that the owner of the Web has left, such as pages he wants me to ignore, non-index pages.

Track content and hyperlinks. With this information, create a structure of your website with all the web pages that exist.

An ideal line length would include how many characters? A. 6570 B. 100 C. 100125 D. 4055

Answers

B 100

Hop this helps

Please mark me as brainliest

I have a small business with only two computers. These computers are connected directly together and share resources. What type of network is established between these computers?

Answers

Hello

For that case, the network is LAN or Local Area Network.

Best regards

LAN/ Local Area Network and it’s n intranet in ur house/place

Key exchange is so important that you should write your own to avoid bugs in other people s libraries. (

a. True

b. False)

Answers

Answer:

The answer to this question is the option "a".

Explanation:

key exchange is a method of cryptography(It is a method of protecting data through the use of codes like abc=@12#.) by which the data exchange between two parties. It follows a cryptographic algorithm. The key exchange also used for key establishment.key exchange is used for data encryption so the answer to this question is true.

There are only three active stations in a slotted aloha network: a, b, and


c. each station generates a frame in a time slot with the corresponding probabilities pa = 0.2, pb = 0.3, pc = 0.4 respectively. what is the throughput of the network?

Answers

Final answer:

The throughput of a Slotted Aloha network with three active stations A, B, and C, having probabilities pa = 0.2, pb = 0.3, and pc = 0.4, is calculated by summing the probabilities of each station transmitting successfully. The throughput is approximately 0.332.

Explanation:

To calculate the throughput of the network using Slotted Aloha, we need to consider the probabilities of each station (A, B, and C) successfully transmitting a frame without a collision. The throughput is the product of the probability that a given station will attempt to transmit in a slot and the probability that none of the other stations will attempt to transmit in the same slot. Given the probabilities, pa = 0.2, pb = 0.3, and pc = 0.4 for stations A, B, and C respectively, we can calculate the throughput as follows:

First, calculate the probability that no station transmits: P(no transmission) = (1 - pa) * (1 - pb) * (1 - pc)Next, calculate the probability that exactly one station transmits, which leads to a successful transmission.So we have three cases for a successful transmission:
Now, add up the probabilities from these three scenarios to find the total probability of a successful transfer: P(success) = pa * (1 - pb) * (1 - pc) + pb * (1 - pa) * (1 - pc) + pc * (1 - pa) * (1 - pb)The throughput of the Slotted Aloha network is then equal to P(success).

When you plug in the given probabilities into the formula, you get P(success) = 0.2 * (1 - 0.3) * (1 - 0.4) + 0.3 * (1 - 0.2) * (1 - 0.4) + 0.4 * (1 - 0.2) * (1 - 0.3). Doing the calculations, P(success), and hence the throughput, is approximately 0.332.

What game was released first, Pac man or Ms. Pac man? Pac man Ms. Pac man same time

Answers

Pac Man was in 1980

Ms. Pac Man was in 1981

What statement best describes the relationship between HTML, XML, and XHTML?

A.They are all markup languages, and all have some commonalities and dissimilarities with each other.

B.HTML and XHTML have some similarities, but XML is a completely different type of language.

C.XML and XHTML have some similarities, but HTML is a completely different type of language.

D.They are all markup languages, but beyond that they are all completely different from one another.

Answers

Final answer:

HTML, XML, and XHTML are all markup languages with commonalities and dissimilarities.

Explanation:

The statement that best describes the relationship between HTML, XML, and XHTML is option A: They are all markup languages, and all have some commonalities and dissimilarities with each other.

HTML (Hypertext Markup Language) is the standard markup language used for creating web pages. XML (eXtensible Markup Language) is a markup language designed to store and transport data. XHTML (Extensible Hypertext Markup Language) is a stricter and more modular version of HTML that follows the rules of XML.

While HTML and XHTML share many similarities, such as using tags to mark up content, XML is a more general-purpose language that can be used for various purposes outside of web development.

Final answer:

The correct option (A) is "They are all markup languages, and all have some commonalities and dissimilarities with each other."HTML, XML, and XHTML are all markup languages with commonalities and differences. HTML is for web pages, XML is for encoding general documents, and XHTML is HTML reformulated as XML.

Explanation:

The best statement that describes the relationship between HTML, XML, and XHTML is option A: They are all markup languages, and all have some commonalities and dissimilarities with each other.

HTML (HyperText Markup Language) is the standard markup language for creating web pages and web applications. XML (eXtensible Markup Language) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. The design goals of XML emphasize simplicity, generality, and usability across the internet. XHTML (eXtensible HyperText Markup Language) is part of the family of XML markup languages. It mirrors or extends versions of the widely used HTML, the language in which web pages are formulated.

When considering what it means for two languages to be related, option C is correct: 'They evolved from the same older language.' HTML and XHTML are closely related as XHTML is essentially HTML expressed as valid XML, whereas XML is a separate standard that both HTML and XHTML can utilize for data structure and presentation.

2. Do you think IPv4 networks continue on, or will everyone eventually switch over to IPv6? How long do you think it will take?

Answers

I am reminded of a speaker from a large financial institution that talked about the hundreds of legacy protocols that they support in the 21st century.  He mentioned that they disabled exactly one during his twenty year tenure:

Ship to shore morse code for credit card payment.

So, I think it is safe to say "never."  

Just like there will always be some programs written in COBOL, FORTRAN and ADA, there will always be pockets of IPv4 where it just doesn't make sense to upgrade.

One of the best examples of outcome control is the re-hiring of Steve Jobs by Apple as CEO

Answers

Yes because the $$$$ MONEY!

“Media plays a crucial role in a democracy.”

Which statement correctly supports this claim?

A.
Media consists of powerful people.
B.
Media conveys the problems of common people to the government.
C.
Media influences consumer choices.
D.
Media breaks the societal norms and traditions.
E.
Media creates many job opportunities for people.

Answers

I would say C. In a democracy the people choose so if media affects people’s choices than it can affect a vote.

The correct answer is B. Media conveys the problems of common people to the government.

Explanation:

When you use a detail, fact or idea to support a claim the purpose is to explain or prove the claim is valid. This implies, in the case presented an effective supporting statement should explain the importance of media for democracy.

According to this, the best option is "Media conveys the problems of common people to the government" because if media shows people's problems, politicians will consider the needs of people, and therefore this supports democracy or the power of citizens to influence government.

How are people using lying today? What are the types of lying? Describe each type.

Answers

people are using lying t hide the fact that their lives are worse everyone lies everyday about them selves

people are lying in many different ways, either for personal benefit, or someones elses benefit. the different types are bulter, sock puppet, and the chinese water army. a butler example is “i have work i gotta go”, this type of lie to used to keep relationships. a sock puppet example is someone giving themselves a good review online. the last one is chinese water army, means when people in china are paid to produce content, like fake hotel reviews.

When the brain mixes up its sight signals, an optical illusion results.

True
False

Answers

It would be true I believe

a type of researcher who uses computers to make sense of complex digital data is called what?

Answers

The answer is a Data Scientist :)

Public speaking and composition writing are very similar forms of communication. True False

Answers

True facts right there

What is a server?
a. an other name for a network administrator
b. software that keeps out unwanted network traffic
c. hardware and software that connects the parts of a network
d. hardware that connects many devices to a network using a single port

Answers

c. hardware and software that connects the parts of a network

What are the elements that makeup a multimedia presentation?

Answers

There are five different elements that make up a multimedia presentation. They are text, image, audio, video, and animation.

Although there are five multimedia elements, (text, image, audio, video, and animation), text is the most popular one that is used.

some computor monitors are designed to display contents better at a(n) ____ resolution.

a) Optimal
b) Benchmark
c) Baseline
d) Main

Answers

Answer:

a) Optimal

Explanation:

One of the most important factors of a monitor is the screen resolution. This factor allows the computer to a better display of contents. So a right screen resolution allows the full view of a computer. Windows 10/8/7 shows the best settings by default, but there is option to increase or decrease the size of text on your screen as well as other items, but without changing the optimal resolution.

______ provides high speed information processing by enabling a new set of instructions to start before the previous set is finished?

Answers

Answer: The answer is: hyper-threading

Explanation: Hyper-threading provides high speed information processing by enabling a new set of instructions to start before the previous set is finished.

Hyper-Threading is an Intel processor which allows cores to process tasks continuously without any waiting for one another. It is a technology that gives permission to a single processor to act like two separate processors to the operating system and the application programs.

The World Wide Web is a program that allows you to search for information on the Internet.

Answers

Yes this is true. It also helps us to keep in touch with our loved ones, etc.

Answer:

This is  FALSE not true

Explanation:

I did the exam

What does the series of 0's and 1's translate to using binary code


01110101 01110010 00100000 01101101 01101111 01101101 00100000 01100111 01100001 01111001

Answers

Nice one but there can be a change to that sentence to make it correct and that would be your mom lesbian

Choose the system to which this item belongs:

villi

excretory
circulatory
endocrine
digestive
respiratory

Answers

Digestion

villi is located in the small intestine its job is to absorb nutrients! Hope this helps :)

In order to quickly change text alignment, a PowerPoint user can select text and then hover over it to make the ______ Toolbar appear with formatting options.

Answers

Final answer:

In PowerPoint, users can utilize the Mini Toolbar, Home tab, and Formatting Palette to quickly change text alignment.

Explanation:

To quickly change text alignment in PowerPoint, users can select text and then hover over it to make the Mini Toolbar appear with formatting options. The Mini Toolbar provides quick access to commonly used formatting tools without the need to navigate through different tabs.

Additionally, users can access formatting options through the Home tab where they can apply various alignments, fonts, sizes, and other formatting features to text.

Another way to change text alignment is by using the Formatting Palette, which provides users with a range of styling options to customize their text.

What age group is currently experiencing the most growth in terms of social media use? 12 and under 18-25 34-40 55 and over

Answers

18-25 are the most growth in social media

What kind of graph is this?



a.

circle graph


b.

bar graph


c.

line graph


d.

scatter plot

Answers

Picture... please? I mean how am i supposed to know

There's no image, so therefore we cannot help you.

Often duties and taxes are imposed on cars that are imported fron other countries. What type of incentives are these duties and taxes?

Answers

These duties and taxes are charged on imported cars in order to incentivize the people to purchase vehicles built in the home county instead.

Answer:

b on e2020

Explanation:

What risk relates to insecure direct object references?


A- References can be altered to gain access to unauthorized data.


B- References can be deleted.


C- References can be copied and used to attack other databases.


D- There is no risk

Answers

A. References can be altered to gain access to unauthorized data

The risk associated with insecure direct object references is that unauthorized data access can be gained by altering references. This security flaw violates the confidentiality and integrity of a system, calling for rigorous security measures to prevent exploits.

The risk that relates to insecure direct object references (IDOR) is that (A) references can be altered to gain access to unauthorized data. In an IDOR attack, an attacker might manipulate references to gain access to data they are not authorized to see, such as files, database records, or other sensitive information. This type of flaw occurs when an application provides direct access to objects based on user-supplied input without proper authorization checks.

Insecure direct object references can lead to major security breaches, impacting the confidentiality and integrity of a system—which are two core components of the CIA triad in information security, where 'CIA' stands for Confidentiality, Integrity, and Availability. A successful IDOR attack might allow attackers to bypass authentication and authorization mechanisms, directly targeting the objects that represent sensitive data.  

Organizations need to be mindful of IDOR threats and implement stringent security measures like access control lists, strong session management, and input validation to protect against such vulnerabilities. Awareness of these risks is essential in the design of secure systems to mitigate potential exploits.

Vulnerable road users such as pedestrians who are engaged in work along the roadway __________

Answers

Answer:you dont have safari?

Explanation:

Other Questions
Describe the tone of Hamlet's aside after Claudius greets him as "my cousin Hamlet and my son". Why might he feel this way? which sequence shows the numbers in order from least to greatest? Jason applies a force of 4.00 newtons to a sled at an angle 62.0 degrees from the ground. What is the component of force effective in pulling the sled horizontally along the ground? In writing this excerpt, the author employed Why do you divide by 60 after calculating the area of the trapezoid (to calculate the distance)? I got 900 but I dont know why you divide by 60 to get 15 as your answer. Ignore the pen marks. When your ask the question, are there many dead links on the page? Which aspect of the web resource are you evaluating The primary reason steroid hormones usually act slowly is that _____. Identify the area of the figure. PLEASE HELP!! which sequence shows the numbers in order from least to greatest Red Cloud Part B Charles A. Eastman The grammatical errors in this passage are intentional. 1 (12) I once asked Red Cloud if he could recall having ever been afraid, for in reply he told me this story. He was about sixteen years old and had already been once or twice upon the warpath, when one fall his people were hunting in the Big Horn country, where they might expect trouble at any moment with the hostile Crows or Shoshones. (13) Red Cloud had followed a single buffalo bull into the Bad Lands and being out of sight and hearing of his companions.When he had brought down his game, he noted carefully every feature of his surroundings so that he might at once detect anything unusual, and tied his horse with a long lariat to the horn of the dead bison, while skinning and cutting up the meat so as to pack it to camp. (14) Every few minutes he paused in his work to scrutinize the landscape if he had a feeling that danger was not far off. 2 Suddenly, almost over his head, as it seemed, he heard a tremendous war whoop, and glancing sidewise, thought he beheld the charge of an overwhelming number of warriors. (15) He tried desperately to give the usual undaunted war whoop in reply, but instead a yell of terror burst from his lips, his legs gave way under him, and he fell in a heap.When he realized, the next instant, that the war whoop was merely the sudden loud whinnying of his own horse, and the charging army a band of fleeing elk, he was so ashamed of himself that he never forgot the incident, although up to that time he had never mentioned it. (16) His subsequent, that the lesson was well learned, career would indicate 3 (17) The future leader was still a very young man, so he joined a war party against the Utes. Having pushed eagerly forward on the trail, he found himself far in advance of his companions as night came on, and at the same time rain began to fall heavily. (18) Among the scattered scrub pines, the lone warrior done found a natural cave, and after a hasty examination, he decided to shelter there for the night. 4 (19) Scarcely had he rolled himself in his blanket when he heard a slight rustling at the entrance, as if some creature were preparing to share his retreat. It was pitch dark. He could see nothing, but judged that it must be either a man or a grizzly. (20) There was not room to draw a bow. It must be between knife and knife, or between knife and claws, he said to himself. 5 (21) The intruder made no search so quietly lay down in the opposite corner of the cave. Red Cloud remained perfectly still, scarcely breathing, his hand upon his knife. Hour after hour he lay broad awake, while many thoughts passed through his brain. Suddenly, without warning, he sneezed, and instantly a strong man sprang to a sitting posture opposite. (22) The first gray of morning will be creeping into their rocky den, and behold! a Ute hunter sat before him. 6 (23) Desperate as the situation appeared, it wasnt like it was terrible. Neither could afford to take his eyes from the others; the tension was great, till at last a smile wavered over the expressionless face of the Ute. (24) Red Cloud answered the smile, but in that instant a treaty of peace was born between them. 7 Put your knife in its sheath. I shall do so also, and we will smoke together, signed Red Cloud. (25) The other assented gladly, and previously they ratified the truce which assured to each a safe return to his friends. Having finished their smoke, they shook hands and separated. Neither had given the other any information. Red Cloud returned to his party and told his story, adding that he had divulged nothing and had nothing to report. (26) Some were inclined to censure him for not fighting, but he was sustained, who commended his self-restraint, by a majority of the warriors.In a day or two they discovered the main camp of the enemy and fought a remarkable battle, in which Red Cloud especially distinguished himself. Look at the underlined section marked number (25). There may be a mistake in the way the sentence is written. If you find a mistake, choose the answer that corrects the mistake. If there is no mistake, choose Correct as is. A)The other assented gladly, and fortunately they ratified the truce which assured to each a safe return to his friends. B)The other assented gladly, and instead they ratified the truce which assured to each a safe return to his friends. C)The other assented gladly, and thus they ratified the truce which assured to each a safe return to his friends. D)The other assented gladly, and again they ratified the truce which assured to each a safe return to his friends. Eliminate How can you represent constraints by absolute value equations? the graph is a marginal cost curve that compares expenses for producing apple pies. according to the graph, the marginal cost begins to increase when the producer makes A. two pies B. three pies C. four pies. D. five pies If the volume of a confined gas is doubled while the temperature remain constant, what change (if any) would be observed in the pressure What does Cathy say to hurt Esperanza? How are Cathys parents and Esperanzas parents alike? (The House on Mango Street) mark goes to the mall every 4 days, costco every 2 days, and the grocery store every 3 days.if he goes to all three on the 15th, when will he go to all three again? Who first proposed the existence of antimatter Technician A says that the oil control ring scrapes oil off the cylinder wall with each downward piston stroke. Technician B says that a typical oil control ring consists of two separate pieces. Who is right? A. Technician B only B. Both Technicians A and B wrong answer C. Technician A only D. Neither Technician A nor Bp.s "both"is wrong In bears at raspberry time interpret: what does the bear symbolize? Members of a population may be prone to inherited genetic diseases ifa. the level of genetic diversity of the population is high.b. inbreeding takes place frequently within the population.c. a variety of habitats are available to the population.d. interaction between populations takes place in an ecosystem. whats the answer (5+3i)+(2-2i) Steam Workshop Downloader