Explanation:
h1{
tect-shadow: ;
background-size: 50%;
background-color: transparent;
font-family: sans-serif;
font-size: 4em;
}
You decide to test the voltages across several of the components. The measured voltages are:
V1 = 0 Volts
V2 = 12 Volts
V3 = 0 Volts
V4 = 12 Volts
These voltages do not correspond with what should be happening if there is current flowing through each device.
Which statement below describes what is happening?
Zero voltage across the fuse indicates that the fuse is the problem.
12 volts across the resistor and no current indicates that the resistor is blown.
Zero volts across the lamp indicates that the light is bad.
The fuse is bad because there is no current.
Zero volts across the lamp indicates that the light is bad. The correct option is C.
What is resistor?A resistor is a passive two-terminal electrical component used in circuits to implement electrical resistance.
Resistors have a variety of purposes in electronic circuits, including lowering current flow, adjusting signal levels, dividing voltages, biassing active components, and terminating transmission lines.
After the light bulb, a test of 0 volts shows that there is no resistance in the ground circuit.
At that time, the battery is receiving all of the circuit's voltage (by the path of least resistance), and no voltage is passing through the metre (0 volt reading).
Thus, the correct option is C.
For more details regarding resistor, visit:
https://brainly.com/question/24297401
#SPJ1
What order means that the highest numbers will be on top of the column
Answer:
Descending
Explanation:
he files provided in the code editor to the right contain syntax and/or logic errors. In each case, determine and fix the problem, remove all syntax and coding errors, and run the program to ensure it works properly.
An example of the program is shown below:
Enter a number between 1 and 20 >> 5
5 4 3 2 1 Blastoff!
JAVA CODE:
// Prompt user for value to start
// Value must be between 1 and 20 inclusive
// At command line, count down to blastoff
// With a brief pause between each displayed value
import java.util.Scanner;
public class DebugSix3
{
public static void main(String[] args)
{
Scanner keyboard = new Scanner(System.in);
int userNum, val;
final int MIN = 1;
final int MAX = 20;
final int TIME_WASTER = 100000;
System.out.print("Enter a number between " + MIN +
" and " + MAX + " >> ");
userNum = keyboard.nextInt();
while(userNum < MIN && userNum < MAX)
{
System.out.println("Number out of range");
System.out.print("Enter a number between " + MIN + " and " +
MAX + " inclusive >> ");
userNum = keyboard.nextInt();
}
for(val = userNum; val == 0; --val)
{
System.out.print(val + " ");
for(int x = 0; x < TIME_WASTER; ++x)
for(int y = 0; y < TIMEWASTER; ++y)
for(int z = 0; z < TIME_WASTER;);
// Adjust these numbers for faster or slower performance
}
System.out.println("Blastoff!");
}
}
program to take the command line input to cut down the blast off.
// DebugSix3.java
// Prompt user for value to start
// Value must be between 1 and 20 inclusive
// At command line, count down to blastoff
// With a brief pause between each displayed value
import javax.swing.*;
public class DebugSix3
{
public static void main(String[] args)
{
String userNumString;
int userNum, val;
final int MIN = 1;
final int MAX = 20;
userNumString = JOptionPane.showInputDialog(null,
"Enter a number between " + MIN + " and " + MAX + " inclusive");
userNum = Integer.parseInt(userNumString);
while(userNum < MIN || userNum > MAX)
{
userNumString = JOptionPane.showInputDialog(null,
"Number out of range" +
"\nEnter a number between " + MIN + " and " + MAX + " inclusive");
userNum = Integer.parseInt(userNumString);
}
for(val = userNum; val > 0; --val)
{
System.out.print(val + " ");
for(int x = 0; x < 100000; ++x)
for(int y = 0; y < 10000; ++y);
// Adjust these numbers for faster or slower performance
}
System.out.println("Blastoff!");
}
}
learn more about command line input here:
https://brainly.com/question/19569210
#SPJ1
You are developing an application to ingest and process large volumes of events and data by using Azure Event Hubs.
You must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.
Note that it is TRUE to state that you must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.
How is this so?Azure Event Hubs, a data streaming platform,can be integrated with Azure Active Directory (Azure AD) for authentication and authorization purposes.
This ensures that requests to access and utilize Event Hubs resources are authorized and controlled through Azure AD, providing secure and authorized access to the application.
Learn more about Azure Active Directory at:
https://brainly.com/question/28400230
#SPJ1
You are developing an application to ingest and process large volumes of events and data by using Azure Event Hubs.
You must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.
True or False?
Imagine you're an Event Expert at SeatGeek. How would you respond to this customer?
* Hi SeatGeek, I went to go see a concert last night with my family, and the lead singer made several inappropriate comments throughout the show. There was no warning on your website that this show would not be child friendly, and I was FORCED to leave the show early because of the lead singer's behavior. I demand a refund in full, or else you can expect to hear from my attorney.
Best, Blake
By Imagining myself as an Event Expert at SeatGeek.I would respond to the customer by following below.
Dear Ronikha,
Thank you for reaching out to SeatGeek regarding your recent concert experience. We apologize for any inconvenience caused and understand your concerns regarding the lead singer's inappropriate comments during the show.
We strive to provide accurate and comprehensive event information to our customers, and we regret any oversight in this case.
SeatGeek acts as a ticket marketplace, facilitating the purchase of tickets from various sellers. While we make every effort to provide accurate event details, including any warnings or disclaimers provided by the event organizers, it is ultimately the responsibility of the event organizers to communicate the nature and content of their shows.
We recommend reaching out directly to the event organizers or the venue where the concert took place to express your concerns and seek a resolution.
They would be in the best position to address your experience and provide any applicable remedies.
Should you require any assistance in contacting the event organizers or obtaining their contact information, please let us know, and we will be happy to assist you further.
We appreciate your understanding and value your feedback as it helps us improve our services.
Best regards,
Vicky
Event Expert, SeatGeek
For more such questions Event,click on
https://brainly.com/question/30562157
#SPJ8
You are creating a new Active Directory domain user account for the Rachel McGaffey user account. During the account setup process, you assigned a password to the new account. However, you know that the system administrator should not know any user's password for security reasons. Only the user should know his or her own password-no one else. Click the option you would use in the New Object-User dialog to remedy this situation.User must change password of next at next logon
User must modify the next logon's password. "Logon procedure" is another phrase that uses logon as a modifier. To log on is the two-word verb form.
The process of login is used to access an operating system or application, typically on a distant computer. A user almost always has to have both a user ID and a password in order to log on. Simply put, logging in implies confirming the identity of the user. It denotes that a user has been recognized and given permission to enter a website or program where they have already registered. Both web portals and web apps support login. There is no difference in meaning between the spellings login and log-in. They allude to entering a password and username when login into a computer or system, and are from a more recent, technological era.
Learn more about logon here
https://brainly.com/question/14454005
#SPJ4
_________ graphic applications are used today on a variety of devices, including touch-screen kiosks and mobile phones.
Answer:
Explanation:
Adobe Illustrator is the graphic application, that can be used to smartphones to design graphical projects.
A user invokes an app that writes a file. The app displays a progress bar that shows how much of the file has been written. Just as the progress bar reaches 50%, the battery fails and the device crashes. When the user reboots the device, he or she discovers that less than 20% of the file has actually been written. Explain why the app reported writing 50%. Frame your answer in terms of the design of I/O device drivers.
Answer:
The app reported writing 50% before the battery fails is because while writing, the data is been saved in the secondary memory via a buffer and not directly to the primary memory ( RAM ) and its returned from the secondary memory via the buffer to the primary memory
Explanation:
The app reported writing 50% before the battery fails is because while writing, the data is been saved in the secondary memory via a buffer and not directly to the primary memory ( RAM ) and its returned from the secondary memory via the buffer to the primary memory
What the app displays as a progress bar is from the Buffer, this is because as the developer was designing the app he wanted the data entry to be very fast hence he had to send the file through a buffer with the aid of a workstation he designed. so if the secondary storage is slow in returning the data back to the primary memory as fast as it entered the secondary memory via the Buffer, Then the percentage of the file that would be displayed as written when the system reboots will be less than what the app displayed before the reboot i.e. 20% < 50%
what is the numeric value of 19%(2+3) as evulated by Java
Answer:
4
Explanation:
java does parenthesis first then mod so it will do 2+3 which is 5 then 19 mod 5 which is 4(5 goes in evenly 3 times for a total of 15. Mod is the remainder number meaning that 19-15 = 4).
How many clients has
Accenture engaged globally on blockchain?
If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of storage. A file made up of 4097 bytes will use 4096 bytes of storage. A file made up of 4097 bytes will use 4096*2=8192 bytes of storage. Knowing this, can you fill in the gaps in the calculate_storage function below, which calculates the total number of bytes needed to store a file of a given size?
1 def calculate_storage(filesize):
2 block_size = 4096
3 # Use floor division to calculate how many blocks are fully occupied
4 full_blocks = ___
5 # Use the modulo operator to check whether there's any remainder
6 partial_block_remainder = ___
7 # Depending on whether there's a remainder or not, return
8 if partial_block_remainder > 0:
9 return ___
10 return ___
11
12 print(calculate_storage(1)) # Should be 4096
13 print(calculate_storage(4096)) # Should be 4096
14 print(calculate_storage(4097)) # Should be 8192
15 print(calculate_storage(6000)) # Should be 8192
Answer:
def calculate_storage(filesize):
block_size = 4096
full_blocks = filesize // block_size
partial_block = filesize % block_size
if partial_block > 0:
return (full_blocks + 1) * block_size
return filesize
print(calculate_storage(1))
print(calculate_storage(4096))
print(calculate_storage(4097))
Explanation:
The python program defines the function 'calculate_storage' that calculates the block storage used. It gets the number of blocks used to store the data by making a floor division to get the integer value, then it checks for remaining spaces in the block. If there are spaces left, it adds one to the full_blocks variable and returns the result of the multiplication of the full_blocks and block_size variables.
could someone teach me how to program it? Thanks you
Answer:
Did you read the pdf? Also I only know JAVAscript and scratch not Verilog
Explanation:
Which of the following allows computers to process human voice commands into written format
Speech Recognition
Text input
Eye tracking
Auditory flashes
Speech Recognition allows computers to process human voice commands into written format
What is speech recognition?Speech recognition, also known as automatic speech recognition (ASR), is a technology that converts spoken language into written text or other machine-readable formats. it involves the ability of a computer or electronic device to understand and interpret human speech and transcribe it into written form.
Speech recognition systems utilize various techniques, including signal processing, statistical modeling, and machine learning algorithms, to analyze and decode spoken language. these systems are designed to recognize and differentiate between different phonetic units, words, and phrases based on the acoustic characteristics of the speech input.
Learn more about Speech Recognition at
https://brainly.com/question/30483623
#SPJ1
In a peer-to-peer network, every computer can communicate directly with every other computer. In addition, every computer is capable of sending and receiving information to and from every other computer. What security concerns do you have about this type of network
There are lot of computer network. The security concerns do you have about this type of network is that;
They are not really secure this is because in simple installations, data and other resources are shared by network users and this can be easily seen and used by individuals who have not been authorized.Peer-to-Peer Network This is known as a type of network where every computer are able to communicate directly with every other computer.All computer on this network has equal. but, each computer are configured to share only some of its resources. It is known for its security risk of data been not safe in this network.
Learn more about network from
https://brainly.com/question/1172049
what is the entity relationship model?
How To Approach Data Center And Server Room Installation?
Answer:
SEE BELOW AND GIVE ME BRAINLEST
Explanation:
Make a plan for your space: Determine how much space you will require and how it will be used. Consider power requirements, cooling requirements, and potential growth.
Choose your equipment: Based on your unique requirements, select the appropriate servers, storage devices, switches, routers, and other equipment.
Create your layout: Determine the room layout, including rack placement, cabling, and power distribution.
Set up your equipment: Install the servers, storage devices, switches, and other equipment as planned.
Connect your equipment: Connect and configure your servers and other network devices.
Check your systems: Check your equipment to ensure that everything is operating properly.
Maintain and monitor: To ensure maximum performance, always check your systems for problems and perform routine maintenance.
4.9 Code Practice: Question 4 Edhisive
Write a program that asks the user to enter ten temperatures and then finds the sum. The input temperatures should allow for decimal values.
Sample Run
Enter Temperature: 27.6
Enter Temperature: 29.5
Enter Temperature: 35
Enter Temperature: 45.5
Enter Temperature: 54
Enter Temperature: 64.4
Enter Temperature: 69
Enter Temperature: 68
Enter Temperature: 61.3
Enter Temperature: 50
Sum = 504.3
i = 0
total = 0
while i < 10:
temp = float(input("Enter Temperature: "))
total += temp
i += 1
print("Sum: {}".format(total))
I wrote my code in python 3.8. I hope this helps!
The program accepts 10 temperature inputs from the user, and takes the sum of the inputs gives before displaying the total sum of the temperature. The program is written in python 3 ;
temp_count = 0
#initialize the number of temperature inputs given by the user and assign to temp_count variable
sum = 0
#initialize the sum of the temperature inputs given
while(temp_count < 10):
#loop allows 10 inputs from the user
values = eval(input('Enter temperature : '))
#prompts user to input temperature values
sum+= values
#adds the inputted values to sum
temp_count+=1
#increases count of input by 1
print('sum of temperature : ', sum)
#displays the total sum
Learn more :https://brainly.com/question/18253379
explain the structure of c program with example
Answer:
A C program typically consists of a number of components, including preprocessor directives, function prototypes, global variables, functions, and a main function.
Explanation:
Here's an explanation of each component, followed by an example C program that demonstrates their usage:
Preprocessor Directives: Preprocessor directives are instructions to the C preprocessor, which processes the source code before compilation. They usually start with a '#' symbol. Some common directives are #include for including header files and #define for defining constants.
Function Prototypes: Function prototypes provide a declaration of functions that will be used in the program. They specify the function's name, return type, and the types of its parameters.
Global Variables: Global variables are variables that can be accessed by any function in the program. They are usually defined outside of any function.
Functions: Functions are blocks of code that can be called by name to perform specific tasks. They can accept input parameters and return a value. Functions are generally declared before the main function.
Main Function: The main function is the entry point of the program. It's where the execution starts and ends. It has a return type of int and typically takes command-line arguments via two parameters: argc (argument count) and argv (argument vector).
Here's an example C program that demonstrates the structure:
// Preprocessor directives
#include <stdio.h>
// Function prototypes
void print_hello_world(void);
// Global variable
int global_var = 10;
// Functions
void print_hello_world(void) {
printf("Hello, World!\n");
}
// Main function
int main(int argc, char *argv[]) {
// Local variable
int local_var = 20;
printf("Global variable value: %d\n", global_var);
printf("Local variable value: %d\n", local_var);
print_hello_world();
return 0;
}
This simple C program demonstrates the use of preprocessor directives, a function prototype, a global variable, a function, and the main function. When run, it prints the values of a global and a local variable, followed by "Hello, World!".
Cristina works in the sales department of a company that provides security services to businesses. She is writing a proposal to persuade a shopping mall to hire her company. She is using the most recent version of Microsoft word but just learned that the customer has an older version. What word-processing function will let her provide a document her customer's software can read?
In such a situation, Cristina must save the document in a format that the customer's software can read.To ensure compatibility, Cristina can use the "Save As" function to save the document in an earlier version of Microsoft Word format. When using this function, she must choose the earliest version that is compatible with the customer's software.
When writing a proposal to persuade a shopping mall to hire a company that provides security services to businesses, the writer must ensure that the proposal is compatible with the software the customer uses. Cristina works in the sales department of such a company, and she is using the most recent version of Microsoft Word. However, she just learned that the customer has an older version.
In such a situation, Cristina must save the document in a format that the customer's software can read.To ensure compatibility, Cristina can use the "Save As" function to save the document in an earlier version of Microsoft Word format. When using this function, she must choose the earliest version that is compatible with the customer's software.
In this case, she must save the document in a format that is compatible with the older version of Word used by the customer.The "Save As" function in Microsoft Word is used to create a new version of the same document with a different name and file format. It is used to save the document in a different location and to save it in a different format from the original. The function is useful when a document must be saved in a different file format to be compatible with other software programs.
For more such questions on Microsoft Word, click on:
https://brainly.com/question/25813601
#SPJ8
Ms. Lawson, a primary school teacher, told her students that a photograph of the president is in the public domain. What does she mean by this?
Answer:
He belongs to the nation
Using the concepts of public and private domains, it means that the photograph of the president can be used by anyone without asking for permission.
---------------
Public and private domains:
If an image is of private domain, there is the need to ask the owner for the right to use the image.If it is of public domain, there is no need, as is the case for the president photo in this question.A similar question is given at https://brainly.com/question/12202794
What is the main difference between the ICD-10 annual revision released by the WHO and the ICD-10-CM/PCS annual revision released by CMS and NCHS? ISENTIFY WHICH addendaCMS publishes and which addenda along with the overall connection to the WHO.
Answer:
The U.S. also uses ICD-10-CM (Clinical Modification) for diagnostic coding. The main differences between ICD-10 PCS and ICD-10-CM include the following: ICD-10-PCS is used only for inpatient, hospital settings in the U.S., while ICD-10-CM is used in clinical and outpatient settings in the U.S.
Explanation:
QUESTION 5 OF 30
Burnout can happen quickly when
working with multiple sysadmins
working overtime
working as the sole sysadmin
Answer:
Burnout can happen quickly when working with multiple sysadmins, working overtime, or working as the sole sysadmin.
Explanation:
Which of these statements performs real number quotient division using type casting?
double x = 35 % 10:
double x = 35 / 10;
double x = 35.0 / 10.0;
double x = (double) 35 / 10;
double x = 35.0 % 10.0;
Answer:
Double x = 35 / 10;
Explanation:
Java provides simple data types for representing integers, real numbers, characters, and Boolean types. These types are known as _ or fundamental types.
<3
which of the following is not the correct definition of an operating system
A.
it controls all other execution in a computer
B.
interface between hardware and application programs
C.
its a platform for ensuring that other executions has taken place
D.
maintains consistency of data loss during execution
The correct answer is C. An operating system is not a platform for ensuring that other executions have taken place. An operating system is a software program that manages the hardware and software resources of a computer and provides common services for computer programs. It acts as an interface between the hardware and application programs and controls all other execution in a computer. It also maintains consistency of data during execution.
Many real world problems that we encounter including Information Systems problems are wicked in nature. The following statements are TRUE of the wickedness of these problems EXCEPT….
They have clear avenues for solutions that are simple to identify. Wicked problems lack precise problem descriptions, making them ambiguous, complex, and challenging to resolve.
What are some instances of wicked dilemmas in real life?Some of the most difficult and intricate problems of our time—many of which endanger human health—are referred to as "wicked." Examples of such wicked challenges include climate change, biodiversity loss, persistent poverty, the growing obesity pandemic, and food insecurity.
What constitutes a wicked example?adjective a cruel and evil deed In the play, she took on the role of the evil stepmother. After winning, she grinned viciously. Her caustic sense of humour is well recognised. She was a bad case.
To know more about Wicked problems visit:-
https://brainly.com/question/29854616
#SPJ1
Question:
Many real-world problems that we encounter, including Information Systems problems, are wicked in nature. The following statements are TRUE of the wickedness of these problems EXCEPT:
a) They have unclear problem definitions and no definitive solutions.
b) They have multiple and changing constraints.
c) They have well-defined solution paths that can be easily determined.
d) They require a unique approach to every problem instance.
consider the pre- and postplanning needs of a film production, as well as what you will need to do during the actual filming of the video. Your action plan should be at least 150 words in length.
During the initial stages of a movie-making process, you must craft a script, formulate a financial blueprint, obtain funding, employ vital staff members like the director and film crew, search for ideal filming spots, and organize a shooting calendar.
What is postplanning?Postplanning refers to the process of arranging post-production tasks, such as refining, sound manipulation, and enhancing visual elements.
Additionally, it involves developing and implementing promotional and delivery tactics.
While filming, your role would involve supervising the setting, collaborating with the cast and crew, handling intricate technicalities such as lighting and camera work, ensuring adherence to the script, and tackling any unforeseen obstacles that surface on set to facilitate a seamless production experience.
Read more about postproduction here:
https://brainly.com/question/31651152
#SPJ1
In this lab, you use what you have learned about searching an array to find an exact match to complete a partially prewritten C++ program. The program uses an array that contains valid names for 10 cities in Michigan. You ask the user to enter a city name; your program then searches the array for that city name. If it is not found, the program should print a message that informs the user the city name is not found in the list of valid cities in Michigan.
The file provided for this lab includes the input statements and the necessary variable declarations. You need to use a loop to examine all the items in the array and test for a match. You also need to set a flag if there is a match and then test the flag variable to determine if you should print the the Not a city in Michigan. message. Comments in the code tell you where to write your statements. You can use the previous Mail Order program as a guide.
Instructions
Ensure the provided code file named MichiganCities.cpp is open.
Study the prewritten code to make sure you understand it.
Write a loop statement that examines the names of cities stored in the array.
Write code that tests for a match.
Write code that, when appropriate, prints the message Not a city in Michigan..
Execute the program by clicking the Run button at the bottom of the screen. Use the following as input:
Chicago
Brooklyn
Watervliet
Acme
Based on your instructions, I assume the array containing the valid names for 10 cities in Michigan is named michigan_cities, and the user input for the city name is stored in a string variable named city_name.
Here's the completed program:#include <iostream>
#include <string>
int main() {
std::string michigan_cities[10] = {"Ann Arbor", "Detroit", "Flint", "Grand Rapids", "Kalamazoo", "Lansing", "Muskegon", "Saginaw", "Traverse City", "Warren"};
std::string city_name;
bool found = false; // flag variable to indicate if a match is found
std::cout << "Enter a city name: ";
std::getline(std::cin, city_name);
for (int i = 0; i < 10; i++) {
if (city_name == michigan_cities[i]) {
found = true;
break;
}
}
if (found) {
std::cout << city_name << " is a city in Michigan." << std::endl;
} else {
std::cout << city_name << " is not a city in Michigan." << std::endl;
}
return 0;
}
In the loop, we compare each element of the michigan_cities array with the user input city_name using the equality operator ==. If a match is found, we set the found flag to true and break out of the loop.
After the loop, we use the flag variable to determine whether the city name was found in the array. If it was found, we print a message saying so. If it was not found, we print a message saying it's not a city in Michigan.
When the program is executed with the given input, the output should be:
Enter a city name: Chicago
Chicago is not a city in Michigan.
Enter a city name: Brooklyn
Brooklyn is not a city in Michigan.
Enter a city name: Watervliet
Watervliet is a city in Michigan.
Enter a city name: Acme
Acme is not a city in Michigan.
Read more about programs here:
https://brainly.com/question/26134656
#SPJ1
program a macro on excel with the values: c=0 is equivalent to A=0 but if b is different from C , A takes these values
The followng program is capable or configuring a macro in excel
Sub MacroExample()
Dim A As Integer
Dim B As Integer
Dim C As Integer
' Set initial values
C = 0
A = 0
' Check if B is different from C
If B <> C Then
' Assign values to A
A = B
End If
' Display the values of A and C in the immediate window
Debug.Print "A = " & A
Debug.Print "C = " & C
End Sub
How does this work ?In this macro, we declare three integer variables: A, B, and C. We set the initial value of C to 0 and A to 0.Then, we check if B is different from C using the <> operator.
If B is indeed different from C, we assign the value of B to A. Finally, the values of A and C are displayed in the immediate window using the Debug.Print statements.
Learn more about Excel:
https://brainly.com/question/24749457
#SPJ1
The best method to prevent information on a disk from being discovered is to: A) use DOD overwrite protocols in wiping information from the disk. B) put the disk and the computer under water. C) melt the plastic disk contained within a hard drive container. D) smash the drive with a stout hammer
Answer:
C) Melt the plastic disk contained within a hard drive container
Explanation:
Data protection is very necessary from keep saving information from those that are not eligible to access it. It helps to avoid phishing scams, and identity theft.Alot of information are stored on the harddisk daily which can be read by disk drive, as situation can warrant prevention of third party from discovering information on it.There is hard platter used in holding magnetic medium in hard disk which make it different from flexible plastic film used in tapes.The disk drive container helps to hold as well power the disk drive.
It should be noted that The best method to prevent information on a disk from being discovered is to firstly
Melt the plastic disk contained within a hard drive container.
Can someone give me an example of code of any cartoon character using java applet please help me i need to make my project please☹️
The Java code for a cartoon character using java applet is
import java.applet.Applet;
import java.awt.*;
public class CartoonCharacter extends Applet implements Runnable {
Thread t;
int x = 0;
int y = 100;
public void init() {
setSize(500, 500);
setBackground(Color.white);
}
public void start() {
if (t == null) {
t = new Thread(this);
t.start();
}
}
public void run() {
while (true) {
x += 10;
repaint();
try {
Thread.sleep(100);
} catch (InterruptedException e) {}
}
}
public void paint(Graphics g) {
g.setColor(Color.red);
g.fillOval(x, y, 50, 50);
}
}
How does the code work?Note that the cartoon character is made like a red circle that navigates accross the screent.
The init() method sets the size of the applet and its background color, while the start( ) method creates a new thread and starts the animation loop in the run() method
Learn more about Java Code at:
https://brainly.com/question/29897053
#SPJ1