1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina CMI [18]
9 months ago
12

consider the following code segment, which appears in a method in a class other than password. the code segment does not compile

.
Computers and Technology
1 answer:
Romashka [77]9 months ago
4 0

The code segment does not compile because the method 'reset' does not return a value that can be displayed.

A method refers to a block of that which only runs when it is called. It is permissible to pass data, referred to as parameters, into a method. Methods are used to accomplish certain actions, and they are also called functions. As per the given code segment that appears as a method in a class, it does not compile because the method named 'reset' is not returning a value that can be printed on the screen as an output.

"

<em>Complete question:</em>

Consider the following code segment, which appears in a method in a class other than password.

Password p = new Password("password");

System.out.println("The new password is " + p.reset("password"));

The code segment does not compile because _____________ .

"

You can learn more about Method at

brainly.com/question/27415982

#SPJ4

You might be interested in
What are the preset formulas in a spreadsheet called?
Oksanka [162]
They are called functions on a spreadsheet.
5 0
3 years ago
Read 2 more answers
. Convert your age into binary and then to hexadecimal. Show your work.
Dovator [93]

Explanation:

Age = 23.

To convert a base 10 number to hexadecimal number we have to repeatedly divide the decimal number by 16 until  it becomes zero and store the remainder in the reverse direction of obtaining them.

23/16=1 remainder = 5

1/16=0 remainder = 1

Now writing the remainders in reverse direction that is 15.

My age in hexadecimal number is (15)₁₆.

5 0
3 years ago
Why does it say error on that last line of code
wel

Answer:

i have no clue

Explanation:

8 0
3 years ago
Read 2 more answers
. wireless network adapters differ from regular networkadapters because theycontain………………..
Nataly_w [17]

Answer: Transceivers

Explanation:

 Wireless network adapters differ from regular network adapters because they contain transceivers as, the transceiver is that portion of the network interface which transmitted the data by concerting digital data into the digital signals in the medium. Basically, the network adapter are responsible for connected the host in the network medium and also convert the binary form data.Transceiver signal are basically depends upon the type of the network.

8 0
3 years ago
Match the following unit 6 terms with their descriptions
Romashka [77]

Answer:

what are the followin six terms

Explanation:

6 0
3 years ago
Other questions:
  • You should use _____ software for writing a letter.
    10·1 answer
  • What characteristics need to be exhibited by an organisation to improve its software process?
    7·1 answer
  • Which part of a fax cover sheet helps the recipient verify the successful transmission of all the pages? A) REMARKS: be) TOTAL N
    7·2 answers
  • A forensic investigator at a crime lab is performing a forensic analysis of a hard drive that was brought in by state troopers.
    10·1 answer
  • Assume that we have an application with a total of 500,000 instructions where 20% of them are the load/store instructions with a
    14·1 answer
  • What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground
    10·1 answer
  • What is the difference between amplifier and the repeater?
    11·1 answer
  • A communication medium that carries a large amount of data at a fast speed is called
    6·1 answer
  • Create a vector of structures experiments that stores information on subjects used in an experiment. Each struct has four fields
    12·1 answer
  • Cui documents must be reviewed to which procedures before destruction?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!