1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rus_ich [418]
4 years ago
13

In Java, it is not possible for a method to call itself? (true,false)

Computers and Technology
1 answer:
IgorC [24]4 years ago
4 0

Answer:

false

Explanation:

You could just call a method itself and just have a condition to get out. For example an recursive method with a base case.

You might be interested in
Write a program that asks the user to input their first and last names. The first prompt should state:
VikaD [51]

first = input("Please input your first name: ")

last = input("Please input your last name: ")

print(last+", "+first)

I hope this helps!

8 0
3 years ago
Which of the following is true about ISO___________.
Svetach [21]

Answer:

The answer is "Option d".

Explanation:

In the given question in option b and option c, there is some typing mistake, but all the options are correct.

ISO is an organization, that is based on Geneva, which is a member of Switzerland. It provides one of the major guidelines for developing entities, that provides technical suggestions on frameworks for data communication.

  • It is used to optimize products with businesses across ranges.
  • The primary aim was to facilitate trade, but in several ways, it focus on enhancing procedures, safety, and quality.
3 0
3 years ago
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is ref
polet [3.4K]

Answer:

"Advanced persistent threat " is the right one.

Explanation:

  • APT seems to be a clandestine cyber assault on something like a network connection where another assailant achieves and retains unauthorized knowledge to the communication network, however impossible to conceive for a considerable period.
  • They represent compound channel assaults that use different components including various approaches of attack.
6 0
3 years ago
What is the significance of XML tags?
tatyana61 [14]

Answer:

your answer would be to ur question would be B

7 0
3 years ago
A written document containing a description of a property as of the day of inspection is called a(n) 
meriva
D. An inspection report! Hope this helps!
5 0
3 years ago
Other questions:
  • Which two computer peripherals are connected to the computer through a port?
    9·1 answer
  • The two types of objects responsible for collecting data are
    14·1 answer
  • Only class b and class c networks can be subnetted true or false
    6·1 answer
  • Please answer this a due tomorrow!!!
    5·1 answer
  • The _____ search algorithm searches a list for a given item, starting with the first element and continues to compare the item w
    12·1 answer
  • Which of the following is a strategy used to enhance communication in a presentation?
    14·1 answer
  • _____ creates a border or space that separates information.
    14·1 answer
  • How does computer applications affect our lives daily? 1- paragraph (4 sentences)
    8·2 answers
  • What do you call the quality of information
    5·1 answer
  • Sharon's company has written a new computer program, and she has been asked to find a way to prevent people from copying the sof
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!