To prevent long page load times for pages containing images, it is best to use a compressed file format such as JPG, as well as appropriate image dimensions and
resolution.
magnification.
orientation.
colors.

Answers

Answer 1

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The given options to this question are:

resolution. magnification. orientation. colors.

The correct option to this question is 1. i.e.

Resolution.

The resolution of an image determines how many pixels per inch an image contains. Image having a higher resolution takes long page load times for a page and lower resolution takes less page load time. So, to prevent long page load times for pages containing images, it is best to use compressed file formation as well as appropriate image dimension and resolution.

While other options are not correct because:

Magnification, orientation, and color does not affect the page load time. Page load time for images only affected by the dimension and resolution of the images.


Related Questions

Which command would you use to replace all the Os and 1s in a spreadsheet
with As and Bs?
A. Alt + E
B. Alt + Tab
C. Ctrl + X (or Cmd + X on a Mac)
OD. Ctrl + F (or Cmd + F on a Mac)

Answers

The correct command to replace all the Os and 1s in a spreadsheet with As and Bs is: D. Ctrl + F (or Cmd + F on a Mac)

What is the command?

The Ctrl + F (or Cmd + F on a Mac) command is usually used to open the "Find and Replace" talk snare miscellaneous requests, including computer program programs like Microsoft Excel or G/o/o/gle Sheets.

The "Find and Replace" talk box supports a available habit to follow distinguishing quotation or principles inside a spreadsheet and change ruling class accompanying various manual or principles.

Learn more about   spreadsheet from

https://brainly.com/question/4965119

#SPJ1

In this lab, you use what you have learned about searching an array to find an exact match to complete a partially prewritten C++ program. The program uses an array that contains valid names for 10 cities in Michigan. You ask the user to enter a city name; your program then searches the array for that city name. If it is not found, the program should print a message that informs the user the city name is not found in the list of valid cities in Michigan.

The file provided for this lab includes the input statements and the necessary variable declarations. You need to use a loop to examine all the items in the array and test for a match. You also need to set a flag if there is a match and then test the flag variable to determine if you should print the the Not a city in Michigan. message. Comments in the code tell you where to write your statements. You can use the previous Mail Order program as a guide.

Instructions
Ensure the provided code file named MichiganCities.cpp is open.
Study the prewritten code to make sure you understand it.
Write a loop statement that examines the names of cities stored in the array.
Write code that tests for a match.
Write code that, when appropriate, prints the message Not a city in Michigan..
Execute the program by clicking the Run button at the bottom of the screen. Use the following as input:
Chicago
Brooklyn
Watervliet
Acme

Answers

Based on your instructions, I assume the array containing the valid names for 10 cities in Michigan is named michigan_cities, and the user input for the city name is stored in a string variable named city_name.

Here's the completed program:

#include <iostream>

#include <string>

int main() {

   std::string michigan_cities[10] = {"Ann Arbor", "Detroit", "Flint", "Grand Rapids", "Kalamazoo", "Lansing", "Muskegon", "Saginaw", "Traverse City", "Warren"};

   std::string city_name;

   bool found = false;  // flag variable to indicate if a match is found

   std::cout << "Enter a city name: ";

   std::getline(std::cin, city_name);

   for (int i = 0; i < 10; i++) {

       if (city_name == michigan_cities[i]) {

           found = true;

           break;

       }

   }

   if (found) {

       std::cout << city_name << " is a city in Michigan." << std::endl;

   } else {

       std::cout << city_name << " is not a city in Michigan." << std::endl;

   }

   return 0;

}

In the loop, we compare each element of the michigan_cities array with the user input city_name using the equality operator ==. If a match is found, we set the found flag to true and break out of the loop.

After the loop, we use the flag variable to determine whether the city name was found in the array. If it was found, we print a message saying so. If it was not found, we print a message saying it's not a city in Michigan.

When the program is executed with the given input, the output should be:

Enter a city name: Chicago

Chicago is not a city in Michigan.

Enter a city name: Brooklyn

Brooklyn is not a city in Michigan.

Enter a city name: Watervliet

Watervliet is a city in Michigan.

Enter a city name: Acme

Acme is not a city in Michigan.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

What are the Benefits and drawbacks of automatic stock control?

Answers

The automatic stock control are benefits and drawbacks are:

Automatic stock control benefit:

Rises Customer Satisfaction.

Automatic stock control drawbacks:

Low management costs

What is stock?

The term stock refers to the product are the ready to the sale for the bulk in the production. The stock are always in the bulk in items. The stock are the measure according to the quantity. The stock was ready to deliver to the wholesaler.

Automatic stock control benefit:

Reduced Overhead Costs.Rises Customer Satisfaction.

Automatic stock control drawbacks:

Low management costs Easy to manages.

As a result, the automatic stock control are benefits and drawbacks.

Learn more about stock, here:

https://brainly.com/question/14649952

#SPJ1

Is there an ethically acceptable reason to study and use the various attack methods described in this chapter? Can you think of any examples where ethical hacking occurs? What is your opinion of ethical hacking and can it be beneficial?

Answers

Answer:

Please see below  

Explanation:

Yes, there indeed is ethical justification for hacking certain computer systems. Since computer scientists are required to keep the system secure from external threats, so they make use of it when testing the network for potential loopholes that could make it vulnerable. It is beneficial in that it can help manifest the weaknesses present in the system, which can then be corrected for.

What is the critical path?


Calculate the minimum overall project completion time and identify which activities are critical by filling out the chart below-forward and backward pass.

What is the maximum time to complete the projects?


Early start Early Finish late start Late finish Slack Critical path?


A
B
C
D
E
F
G
H


Please answer and thank you

What is the critical path?Calculate the minimum overall project completion time and identify which activities

Answers

Answer:

yeeeee

Explanation:yeeees quen                   HI SISTERS HI SISTERS

xamine the following output:

Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115

Which of the following utilities produced this output?

Answers

The output provided appears to be from the "ping" utility.

How is this so?

Ping is a network diagnostic   tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).

In this case, the output shows   the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.

Ping is commonly used to troubleshoot   network connectivity issues and measureround-trip times to a specific destination.

Learn more about utilities  at:

https://brainly.com/question/30049978

#SPJ1

You are given an array of integers, each with an unknown number of digits. You are also told the total number of digits of all the integers in the array is n. Provide an algorithm that will sort the array in O(n) time no matter how the digits are distributed among the elements in the array. (e.g. there might be one element with n digits, or n/2 elements with 2 digits, or the elements might be of all different lengths, etc. Be sure to justify in detail the run time of your algorithm.

Answers

Answer:

Explanation:

Since all of the items in the array would be integers sorting them would not be a problem regardless of the difference in integers. O(n) time would be impossible unless the array is already sorted, otherwise, the best runtime we can hope for would be such a method like the one below with a runtime of O(n^2)

static void sortingMethod(int arr[], int n)  

   {  

       int x, y, temp;  

       boolean swapped;  

       for (x = 0; x < n - 1; x++)  

       {  

           swapped = false;  

           for (y = 0; y < n - x - 1; y++)  

           {  

               if (arr[y] > arr[y + 1])  

               {  

                   temp = arr[y];  

                   arr[y] = arr[y + 1];  

                   arr[y + 1] = temp;  

                   swapped = true;  

               }  

           }  

           if (swapped == false)  

               break;  

       }  

   }

A computer-aided drafting application would be best run on which type of device?

O Laptop
O Desktop
O Tablet
O Smartphone

Answers

A desktop because it would just work best. I’m not 100% sure this is right tho
The answer is desktop because it has the most processing power no matter what

An __________ hard drive is a hard disk drive just like the one inside your, where you can store any kind of file.

Answers

An external hard drive is a hard disk drive just like the one inside your computer, where you can store any kind of file.

These drives come in various sizes, ranging from small portable drives that can fit in your pocket to larger desktop-sized drives with higher storage capacities. They often offer greater storage capacity than what is available internally in laptops or desktop computers, making them useful for backups, archiving data, or expanding storage capacity.

Overall, external hard drives are a convenient and flexible solution for expanding storage capacity and ensuring the safety and accessibility of your files.

The tool chest for programmers is also known as the CPU.
True or False?

Answers

Explanation:

I would say yes, but I'm not sure

Yeah I’m pretty sure it’s true

SIDE Name Smith Jones Doe Fid # 302 302 542 222 Varda Carey Course # Name Henry Jackson Schuh Lerner 302 302 542 Year C# Fld # 223 222 Intro Prog Organic Chem Asian Hist Calculus Taught-By Relation Dept Position Prof Assist. Prof Assoc. Prof Assist. Prof Course Name Calculus 3.0 3.5 Math Math 4.0 0.5 Chem Hist Student Relation Dept Math Hist Chem Dept Math CS Chem Hist Math Sid# Faculty Relation Enrolled Relation ARENEN Course Relation 302 302 302 223 Dept Math Math CS CS Chem Hist Math 1. For the top 3 tables, identify the primary key and the foreign key(s). if the table does not have a primary or foreign key, write NONE, then explain your answer​

Answers

Table 1: SIDE
Primary Key: Sid#
Foreign Key(s): None

Table 2: Course
Primary Key: C#
Foreign Key(s): None

Table 3: Faculty
Primary Key: Fid#
Foreign Key(s): None

Table 4: Enrolled
Primary Key: NONE
Foreign Key(s): Sid#, C#

Table 5: Relation
Primary Key: NONE
Foreign Key(s): Sid#, Fid#, C#

In Table 1, the primary key is Sid#, which uniquely identifies each student. There are no foreign keys in this table because it stands alone and does not reference any other tables.

In Table 2, the primary key is C#, which uniquely identifies each course. There are no foreign keys in this table because it also stands alone and does not reference any other tables.

In Table 3, the primary key is Fid#, which uniquely identifies each faculty member. There are no foreign keys in this table because it also stands alone and does not reference any other tables.

In Table 4, there is no primary key because it is a linking table that connects students (referenced by Sid#) to courses (referenced by C#). The foreign keys in this table are Sid# and C#, which reference the primary keys in Tables 1 and 2, respectively.

In Table 5, there is no primary key because it is also a linking table that connects students (referenced by Sid#) to faculty members (referenced by Fid#) for specific courses (referenced by C#). The foreign keys in this table are Sid#, Fid#, and C#, which reference the primary keys in Tables 1, 3, and 2, respectively.

For more such questions on Primary Key, click on:

https://brainly.com/question/12001524

#SPJ11

Which two disciplines should you study if you are considering a career in robotics 

Answers

The use of robotics is a “multi-purpose” (i.e., combining computer engineering with mechanical engineering and electrical engineering).

If one wants to work as a robotics software engineer, he needs to have a bachelor’s degree in Computer Science. If a person is interested in designing robotic parts, he needs a degree in Mechanical Engineering or Electrical Engineering.

Since its beginning, robotics has always been a multidisciplinary discipline, combining engineering, cognitive sciences, computer science, and, in recent years, social science and humanities.

To learn more about engineering, refer to the link:

https://brainly.com/question/31140236

#SPJ1

Cora is a network engineer for a large company and has been given instructions on how to configure a private fiber connection between her company's data center and the cloud service provider her company uses. She needs to configure an ASN on one of the core routers in the data center as part of the connection. Which of the following protocols is she most likely being instructed to configure for use with the CSP?

Answers

Answer: Cora is most likely being instructed to configure the Border Gateway Protocol (BGP) for use with the cloud service provider (CSP).

Explanation:

Cora is most likely being instructed to configure the Border Gateway Protocol (BGP) for use with the cloud service provider (CSP). BGP is a routing protocol that is commonly used in large networks, including those that connect data centers to cloud service providers. It allows for the exchange of routing information between different networks and helps to ensure that data is routed efficiently and reliably. BGP uses Autonomous System Numbers (ASNs) to identify different networks and to facilitate routing between them, which is why Cora needs to configure an ASN on one of the core routers in the data center.

Intelligent transportation systems use GPS to
Select all that apply.

Answers

Answer:

There is nothing to select you did not add any options

Explanation:

In this lab, you use a counter-controlled while loop in a Python program. When completed, the program should print the numbers 0 through 10, along with their values multiplied by 2 and by 10. The data file contains the necessary variable declarations and output statements. Instructions Make sure the file Multiply.py is selected and opened. Write a counter-controlled while loop that uses the loop control variable (numberCounter) to take on the values 0 through 10. In the body of the loop, multiply the value of the loop control variable by 2 and by 10. Remember to change the value of the loop control variable in the body of the loop. Execute the program by clicking the Run button at the bottom of the screen.

Answers

Answer:

In Python:

numberCounter = 0

print("Number\t\tTimes 2\t\tTimes 10")

while numberCounter<=10:

   print(str(numberCounter)+"\t\t"+str(numberCounter*2)+"\t\t"+str(numberCounter*10))

   numberCounter+=1

Explanation:

The required files are not attached to this question. So, the solution I provided is from scratch

This initializes numberCounter to 0

numberCounter = 0

This prints the header

print("Number\t\tTimes 2\t\tTimes 10")

This loop is repeated while numberCounter is not above 10

while numberCounter<=10:

This prints numberCounter along with its product by 2 and 10

   print(str(numberCounter)+"\t\t"+str(numberCounter*2)+"\t\t"+str(numberCounter*10))

   numberCounter+=1

Below is the required Python code for the program.

Python

Program:

head1 = "Number: "

# Multiply by 2

head2 = "Multiplied by 2: "

# Multiply by 10

head3 = "Multiplied by 10: "

# Constant utilized to control loop

NUM_LOOPS = 10

print("0 through 10 multiplied by 2 and by 10" + "\n")

# Initialize loop control variable

x = 0

while(x<11):

# Print the values

   print(head1 + str(x))

   print(head2 + str(x*2))

   print(head3 + str(x*10))

   # Write your counter controlled while loop

   # Next number

   x += 1

Program explanation:

Start code.Constant utilized to control loop.Initialize loop control variable.Multiply by 2.Multiply by 10.Write your counter controlled while loop.

Output:

Please find below the attachment of the program output.

Find out more information about Python here:

https://brainly.com/question/26497128

In this lab, you use a counter-controlled while loop in a Python program. When completed, the program

Solve recurrence relation x (n) = x(n/3) +1 for n >1,x(1) =1. (Solve for n = 3k)

Answers

To solve this recurrence relation, we can use the iterative method known as substitution method. First, we make a guess for the solution and then prove it by mathematical induction.

Let's guess that x(n) = log base 3 of n. We can verify this guess by induction:

Base Case: x(1) = log base 3 of 1 = 0 + 1 = 1. So, the guess holds for n = 1.

Induction Hypothesis: Assume that x(k) = log base 3 of k holds for all k < n.

Induction Step: We need to show that x(n) = log base 3 of n holds as well. We have:

x(n) = x(n/3) + 1

     = log base 3 of (n/3) + 1 (by induction hypothesis)

     = log base 3 of n - log base 3 of 3 + 1

     = log base 3 of n

     

So, x(n) = log base 3 of n holds for all n that are powers of 3.

Therefore, the solution to the recurrence relation x(n) = x(n/3) + 1 for n > 1, x(1) = 1, is x(n) = log base 3 of n for n = 3^k.

Can someone please help me answer these questions plz

Can someone please help me answer these questions plz

Answers

Explanation:

0001, 0010, 0101, 0110, 0111, 1000

Create an ArrayList of Countries

- Create a class called Country.java.

- Instance variables include name (String), capital (String), and population (an int representing the population of the capital)

- Write a 3-arg constructor

- Write 3 accessor methods

- Write a toString method that returns the state/value of all instance variables.


- Test out your class:

- Step 1: Create an ArrayList of five countries.

- Step 2: Print out your ArrayList.

- Step 3: Remove one of the countries.

- Step 4: Print out your ArrayList again.

- Step 5: Create a new country and insert it in the middle of your ArrayList.

- Step 7: Print out your ArrayList again.

- Step 8: Change your last country to the country you removed in Step 3.

- Step 9: Print out your ArrayList again.

Answers

Answer:

Step 1: Create an ArrayList of five countries by creating Country objects and adding them to the ArrayList.

Step 2: Print out your ArrayList by looping through it and printing out each Country object's toString() method.

Step 3: Remove one of the countries from the ArrayList by using the remove() method and passing in the index of the object you wish to remove.

Step 4: Print out your ArrayList again by looping through it and printing out each Country object's toString() method.

Step 5: Create a new country and insert it in the middle of your ArrayList by creating a Country object and using the add() method with the index of the position in the ArrayList.

Step 6: Print out your ArrayList again by looping through it and printing out each Country object's toString() method.

Step 7: Change your last country to the country you removed in Step 3 by first removing the last country from the ArrayList, creating a new Country object using the same parameters as the one you removed earlier, then using the add() method with the index of the last position in the ArrayList.

Step 8: Print out your ArrayList again by looping through it and printing out each Country object's toString() method.

when you look directly at a camera lens, it may seen like there is only one lens, but entering light actually passes through a series of lenses, or_____, that bend the light and send it on its way to be focused on the film or digital. chip

Frame
Optics
Flash
SD cARD

Answers

Answer:

The answer should be optics...

Explanation:

If aa person is known to have look at a camera lens straight and light passes via a number of lenses, or Optics.

What is Optics?

This is known to be an aspect  of physics that looks at the attributes and properties of light, such as its relationship with matter, etc.

Therefore,  If a person is known to have look at a camera lens straight and light passes via a number of lenses, or Optics.

Learn more about Optics from

https://brainly.com/question/18300677

#SPJ9

What is social displacement? Question 22 options: the gained efficiency in being able to communicate through technology , the act of moving files from your computer to an external site , the risk of being "unfriended" by someone on social media , the reduced amount of time we spend communicating face to face

Answers

Answer: The Answer should be D

Explanation: It's the definition.

In an inspection, usually the first thing an inspector will want to see is:

Answers

Answer:

Your records and paperwork

Your paperwork, your skills, and your background/ record.

what are the benefits and drawbacks of a desktop utilising virtualisation and a server?

Answers

•Cons of Virtualization. High Initial Investment. Data Can be at Risk. Quick Scalability is a Challenge. Performance Witnesses a Dip.

•Pros of Virtualization. Uses Hardware Efficiently. Available at all Times. Recovery is Easy. Quick and Easy Setup. Cloud Migration is Easier.

Mark as brainlest answer!!!!!

Why does trust usually break down in a designer-client relationship?


A lack of service

B lack of privacy

C lack of communication

D lack of contract

Answers

Trust is usually broken down in a designer-client relationship due to a lack of service. Thus, the correct option for this question is A.

How do you end a client relationship?

You would end a client relationship by staying calm, rational, and polite. Apart from this, reasons for terminating the relationship, but keep emotion and name-calling out of the conversation.

Follow-up with a phone call. You can start the process with an email, but you should follow up with a phone call in order to talk your client through the process and answer any questions.

But on contrary, one can build trust with clients by giving respect to them, Admit Mistakes and Correct Ethically, listening to them, listening to their words first followed by a systematic response, etc.

Therefore, trust is usually broken down in a designer-client relationship due to a lack of service. Thus, the correct option for this question is A.

To learn more about Client relationships, refer to the link:

https://brainly.com/question/25656282

#SPJ1

Write and test a program that computes the area of a circle. This program should request a number representing a radius as input from the user. It should use the formula 3.14 * radius ** 2 to compute the area, and output this result suitably labeled.

Answers

Answer:

radius = float(input('Radius: '))

area = 3.14 * (radius ** 2)

print(f'Area of the circle is: {area}')

Page
U what is a common language that computers use
to talk with one another on- a network?
a. client b. Adapter
c. protocol d. operating
System​

Answers

I think it’s protocol
The computers use a set of protocols. Therefore, the answer is C. Protocol. I hope this helps.

1.in 3 sentences explain briefly what are the examples of the advantage of using multimedia approach in a slide presentation brainly​

Answers

Multimedia Presentations is very essential in making slide presentation because:

it makes the presentation colorfulIt is often purpose driven andIt challenges one and all listeners to think creatively

Some advantages of Multimedia includes

Oresentations made are concise, rich and makes one to develop confidence in language skills.They captivate audience to visualize what is been taught.

Multimedia agent includes video podcasts, audio slideshows etc. The use of the multimedia in presentation is also very good and user-friendly. It doesn't take much energy out of the user, in the sense that you can sit and watch the presentation,

Conclusively, It uses a lot of the presenters senses while making use of multimedia such as hearing, seeing and talking.

Learn more from

https://brainly.com/question/19286999

What are the main components of a desktop PC and briefly describe their purposes.​

Answers

Answer:

8 Standard Computer Components and What They Do

Explanation:

Motherboard. The motherboard is an important computer component because it’s what everything else connects to!

Power Supply. True to its name, the power supply powers all other components of the machine.

Central Processing Unit (CPU)

Random-access Memory (RAM)

Hard Disk Drive / Solid State Drive.

Video Card.

Optical Drives.

Answer:

For main requirement you'll need

A CPU ( Central Processing Unit)

A GPU (Graphics Processing Unit)

Motherboard for your components to work and transfer data

PSU (Power Supply Unit) for your components to turn on

A RAM (Random Access Memory)

For others you need

Cooler it can be by air, an AIO (All in one water cooler) or an water cooler but water might have a chance of risk to cause shortage for you pc components of it's not secure

Fans for excessive heat and for airflow

A case to keep your components safe and secure

Monitor to see what's going on

Keyboard, mouse, headset, mic, cam

Read and Answer the Question.


After several years of driving long-haul trucks, Joe Blanka

founded his own trucking company, Blanka Transport Inc.

(BTI), which specialized in less-than-truckload shipments in the

midwestern part of the United States. Joe developed a successful

method for scheduling BTI’s runs that met or exceeded the

delivery expectations of its customers. As a result, BTI shipments were growing at a rate between 15 and 20 percent per

year. The growth, however, was not evenly distributed across

BTI’s territory. On some routes, capacity was overloaded in one

direction and underloaded in the other.

Joe noticed that the imbalance problem was not stable

across time. In some months, capacity was short in one direction, and in other months, it was short in another direction. He

thought that one way of solving the problem would be through

marketing, by offering incentives to customers whose shipments

would improve load balance. Another approach to the problem

was to analyze and restructure the route–equipment combinations. He also thought that it might be possible to warehouse

some less-urgent shipments for short periods in order to help

the balance.

Joe’s son, the first member of the Blanka family to attend

college, was a senior in engineering school. He had just completed a course in project management, and after briefly describing some of the basic concepts to his father, he suggested that a

process improvement project might be a good way to deal with

the balance problem. He thought that the Marketing Manager

and the Route Manager could serve as project co-managers. He

also felt that some of the older, more experienced drivers might

be helpful. The objective of the project would be to decrease the

size of the route imbalances by 75 percent in 1 year.


Questions: Is this a proper approach to the problem? Is this a “project”; if

so, what are the three triple constraints? What, if any, helpful

suggestions would you make to Joe?

Answers

Yes, the process improvement project suggested by Joe's son is a proper approach to address the balance problem in the trucking company. It can help decrease the route imbalances by 75 percent in one year.

What are the constraints?

The three triple constraints in this project would be scope (reducing route imbalances), time (1 year), and resources (including the Marketing Manager, Route Manager, and experienced drivers).

Some helpful suggestions for Joe would be to consider implementing a combination of marketing incentives, route restructuring, and short-term warehousing to achieve better load balance.

Additionally, he should ensure effective communication and collaboration between the project co-managers and team members to maximize the project's success.

Read more about project development here:

https://brainly.com/question/27995740

#SPJ1

Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the available options under the More button for the Quick Access toolbar. What should Robyn do?

Access Outlook options in Backstage view.
Access Outlook options from the Home tab.
Access Quick Access commands using the More button.
This cannot be done.

Answers

Access Outlook options in Backstage view

Find the maximum value and minimum value in below mention code. Assign the maximum value to maxMiles, and the minimum value to minMiles. Sample output for the given program:

Min miles: -10
Max miles: 40
Here's what I have so far:

import java.util.Scanner;

public class ArraysKeyValue {
public static void main (String [] args) {
final int NUM_ROWS = 2;
final int NUM_COLS = 2;
int [][] milesTracker = new int[NUM_ROWS][NUM_COLS];
int i = 0;
int j = 0;
int maxMiles = 0; // Assign with first element in milesTracker before loop
int minMiles = 0; // Assign with first element in milesTracker before loop

milesTracker[0][0] = -10;
milesTracker[0][1] = 20;
milesTracker[1][0] = 30;
milesTracker[1][1] = 40;

//edit from here

for(i = 0; i < NUM_ROWS; ++i){
for(j = 0; j < NUM_COLS; ++j){
if(milesTracker[i][j] > maxMiles){
maxMiles = milesTracker[i][j];
}
}
}
for(i = 0; i < NUM_ROWS; ++i){
for(j = 0; j < NUM_COLS; ++j){
if(milesTracker[i][j] < minMiles){
minMiles = milesTracker[i][j];
}
}
}

//edit to here


System.out.println("Min miles: " + minMiles);
System.out.println("Max miles: " + maxMiles);
}

Answers

Answer:

Code works perfectly

Explanation:

There is nothing wrong with your program as it runs perfectly and displays the expected results.

You may need to compile with another compiler if you're not getting the required results.

I've added the source code as an attachment (unedited)

Other Questions
Given J(-8,-5) and L(6,-11), if K(r - 4, 2s) is themidpoint of JL, which correctly gives the valuesof r and s? The iron (55.847 g/mol) in a 700.0 mL sample of a natural water was determined by precipitation of the cation as hydrated Fe2O3. The precipitate was filtered, washed, and ignited in a crucible to form Fe2O3(MW = 159.69 g/mol). The mass of the product was 0.1084 g. Calculate the ppm iron in the water. A cookie factory uses 1/6 of a bag of flour in each batch of cookies the factory used 1/2 of a bag of flour yesterday how many batches of cookies did the factory make explain the processs of combustion what is the process of requesting a certificate, having it approved, and downloading called Identify what type of polygon this is based on its number of sides. Is this a regular polygon why or why not? for all composite integers $n$, what is the largest integer that always divides the difference between $n$ and the cube of $n$? what baroque innovation is shown through the quality of francesco borromini's facade of san carlo alle quattro fontane? PLS HELP WILL MARK YOU BRAINLIEST!!No fake answers pls Which excerpt uses actions to develop Marlene's character? A. "I wish my parents were more like Kat's," Marlene confessed. "They let her stay out late." B. Marlene got her brown eyes from her mother and her pointy chin from her father. C. As Tami passed Marlene, she shoved her and gave a loud snort when Marlene landed on the floor. D. Marlene paced back and forth outside the vet's office as she waited for her cat. Which best describes the action process?a. desire something; develop goal; feedback; execute planb. desire something; feedback; develop goal; generate planc. desire something; develop goal; execute plan; feedbackd. desire something; develop goal; feedback; generate plan Answer plz Determine the answer to 3 + (5) and explain the steps using a number line. A student wants to keep their coffee hot they have a choice of putting it in a silver drinks container or a blacks drinks container. Which would you reccomend to the student and why Miguel has $30. He spends $6.00 on a movie ticket, $3.95 for snacks, and $1.00 for bus fare each way. How much money does Miguel have left? Which of the following statements regarding netting arrangements and the calculated credit equivalent amount are correct according to our discussion in class? I. Without netting, the exposure is the payoff from a portfolio of options. II. With netting, the exposure is the payoff from an option on a portfolio. III. The payoff from an option on a portfolio is greater than the payoff from a portfolio of options. IV. The calculated credit equivalent amount with netting is smaller than that without netting Select one: O a. I and II ob. I, II and III O c. II, III and IV O d. III and IV I and IV how frequently should fire stations undergo safety inspections? Which detail from chapter 5 wheels of change reflects a shift in political views that was occurring at the time the most common and significant complication associated with an acute abdomen is: a. high fever. b. peritonitis. c. severe pain. d. internal bleeding. Using the drop-down menus, answer the questions about cause-and-effect relationships.What causes Robert to meet the number devil?A: Roberts friends introduce them.B: The Number devil sneaks into Robert's roomC: Robert meets number devil in a dreamWhat is the effect of Robert's dream conversation with the number devil?A: Robert is no longer able to sleepB: Robert learns something new about mathC: Robert defeats the devil in a math contest PLEASE HELP!!!!!!!!!!If UV = UX = 34, mUWV= 9z24, and mUWX=z, what is the value of z?