1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksano4ka [1.4K]
3 years ago
13

Consider array items, which contains the values 0, 2, 4, 6 and 8. If method changeArray is called with the method call changeArr

ay(items, items[2]), what values are stored in items after the method has finished executing?
Computers and Technology
1 answer:
bagirrra123 [75]3 years ago
5 0

INCOMPLETE QUESTION

Consider array items, which contains the values 0, 2, 4, 6 and 8. If method changeArray is called with the method call changeArray(items, items[2]), what values are stored in items after the method has finished executing?

public static void changeArray(int[] passedArray, int value)

{

passedArray[value] = 12;

value = 5;

}

A. 0, 2, 5, 6, 12.

B. 0, 2, 12, 6, 8.

C. 0, 2, 4, 6, 5.

D. 0, 2, 4, 6, 12.

Answer:

D. 0, 2, 4, 6, 12

Explanation:

The initial values for the array was 0,2,4,6,8. The method changeArray ( ) when called changes the the the value of the element at the ith index position to 12. so the final elements in the array will be 0,2,4,6,12

You might be interested in
How to play Drinkopoly game?
professor190 [17]
Answer:
Never heard of that lol
3 0
3 years ago
What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative
jarptica [38.1K]

Answer: PKI certificates

Explanation: PKI is known as the public key infrastructure which is commonly used for the encryption of the data and also for the data signing. They have the ability to assign the keys pair.

PKI certificates are in the form of strings of alpha-numeric running for a mathematical functions. They use the third party protocols for the execution and they are widely accepted by the authoritative identity.

5 0
3 years ago
Create a class named CollegeCourse that includes the following data fields: dept (String) - holds the department (for example, E
frez [133]

Answer:

The answer to this question can be given as:

code:

class CollegeCourse  

{

String Dept;

int CourseNumber;

double Credits;

double fee;

}

Explanation:

We all know that class is a collection of data members and member functions. In the above code we use the following syntax for class declaration that can be given as:

Syntax of class declaration :

class class_name

{

data member & member function

}

In the above code firstly we declare a class that is CollegeCourse. In this class, we define a variable that name and datatype is already given in the question that is String Dept, int CourseNumber, double Credits, double fee. In the variables first variable data type is string. It is used for store string value like ('us','xxx','aaa').The second variable datatype is an integer. It is used for store integer value like (1,23,5,56). The third and fourth variable datatype is the same that is double. This data type is used to store the floating-point value.

5 0
3 years ago
Which of the following is the first step in the boot process? Select one: A. The BIOS checks that all devices are operational. B
dalvyx [7]

Answer:

D. The BIOS is activated by powering on the CPU.

Explanation:

The BIOS is activated by powering on the CPU is the first step in the boot process.

5 0
3 years ago
Which tab on the Ribbon contains the command to add a new, blank page to a publication?
aleksklad [387]

It's Insert. Insert > Page > Insert Page

4 0
3 years ago
Other questions:
  • Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many
    15·2 answers
  • Why is Abraham called the Father of Believers?
    6·1 answer
  • Why is drafting important in every industry
    6·1 answer
  • _____ separation strategies (e.g., attacking and sabotaging others) are used by those for whom co-cultural segregation is an imp
    5·1 answer
  • 1024 Megabytes = ____________
    14·1 answer
  • Which style did Jack use on the vocabulary words in reports?
    14·2 answers
  • What do astronomers call a system that is composed of more than two stars?
    9·2 answers
  • Public classes are accessible by all objects, which means that public classes can be ____, or used as a basis for any other clas
    10·2 answers
  • Write a program with a function that accepts a string as an argument and returns the number of uppercase, lowercase, vowel, cons
    14·1 answer
  • Halp me vanajsudhrbfhjrjfjfjf ​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!