1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadya [2.5K]
3 years ago
6

Suppose you wish to write a method that returns the sum of the elements in partially filled array. Which is the best choice for

a method header? Group of answer choices public int sum() public int sum(int[] values, int currSize) public int sum(int[] values) public int sum(int[] values, int size, int currSize)
Computers and Technology
1 answer:
ZanzabumX [31]3 years ago
5 0

Answer:

The Method header to this question is "int sum(int[] values, int currSize)".

Explanation:

According to the question, It is defined that choose the correct option which creates a method header sum and returns the sum of the array element. In given options, we choose option second because in this option method return type is int and use an integer variable that is "currSize" which calculate the sum and return its value and other option are not correct that can be described as:

  • In the first option, we create a method but we do not pass any parameter so it will not calculate the sum of array elements.
  • In the third option, we create a method but we pass only one parameter that is an array. So, it will not calculate the sum of array elements correctly.
  • In the fourth option, In this method, we pass three parameters that are "values, size and currSize" in which the size parameter not use.

That's why the answer to this question is option second which is "int sum(int[] values, int currSize)".

You might be interested in
The main purpose of a honeypot is Select one:
masya89 [10]

Answer:

d. To help security professionals better understand and protect against threats to the system

Explanation:

The main purpose of a honeypot is to attract potential hackers and allow them to have access to a network system that is not the actual live network with close monitoring. This is done so as to learn and understand the intentions of the hacker and how they execute an attack. With this knowledge security professional are in a better position to deal with potential threats and keep the network secure.

4 0
3 years ago
The purpose of a switch______link is to be able to carry the traffic for all local VLANs.
alekssr [168]

Answer:

Inter switch link

Explanation:

It is the inter switch link( ISL) that enables to carry the traffic for all local VLANs. Functions of VLANs are firstly, a VLAN allows us to take one physical switch, and break it up into smaller mini-switches. Secondly, every virtual switch, called VLAN, is simply a number assigned to each switch port.

6 0
3 years ago
Which of the following statements are TRUE about credit cards? I. When you use a credit card, the money comes directly out of yo
Svetllana [295]

i think it is 1. becuase it can be.

4 0
3 years ago
Please briefly describe your QA / testing process?
gtnhenbr [62]

Answer: The QA/Testing process consist of the following:

1. Requirement specification

2. Reviewing the code.

3. Unit testing

4. Integration test

5. Performance testing

Explanation:

We start of by the requirement specification try to gather all the information accurately. Then begins the coding process where there is review of the code so that they perform their desired purpose. After modules are completed we perform unit testing of the different modules individually and also do the integration testing once all the modules are completed. At the end we perform the performance testing to take a note on their desired output and other quality parameters.

4 0
3 years ago
Your supervisor informs you that she would like to roll-out a VPN solution for your organization. Assume this is a small to mid-
katen-ka-za [31]

Answer:

1) The VPN Client

2) VPN Server

Explanation:

The first VPN solution includes following elements.

1) The VPN Client: In our solution we required a VPN client.

2) VPN Server: The server of VPN includes following elements:

a) IP addressing

b) Tunnel and authentication

c) Remote access policy

d) Filtering

3) The software and hardware includes:

a) VPN enabled optamized router

b) VPN enabled firewall

So, according to first VPN solution we required vpn client as well as the vpn server.

The second solution include the vpn client as well as the vpn server. Here vpn client as well as the vpn

server having very limited functionality.

5 0
3 years ago
Other questions:
  • What is the best free game designing program for windows
    5·1 answer
  • Create a program that reads words.txt (link near top of our home page) in order to: determine the length of the longest word(s)
    14·1 answer
  • What items should you evaluate when scouting the facilities at a shooting location?
    11·1 answer
  • Which statement describes borders and shading ?
    13·1 answer
  • How many hosts are in each subnet?
    15·1 answer
  • Give your definition of a view. Based on the Academic Database, identify and describe a scenario where it would be necessary to
    10·1 answer
  • What are the advantages of customer relationship managment​
    10·1 answer
  • Define artificial intelligence?​
    15·2 answers
  • The engine that runs the computer. Small computers have one, while larger computers may
    15·1 answer
  • How is information sent across the internet binary
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!