1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Digiron [165]
3 years ago
11

How to set the maximum to 10? Java

Computers and Technology
1 answer:
hichkok12 [17]3 years ago
6 0
Public int setLimit(parameter) {
if (parameter > 10) {
return 10;
} else {
return parameter;
}
}
You might be interested in
Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information f
slava [35]

Answer:

C. NFC

Explanation:

NFC stands for Near Field Communication. NFC is been embedded in recent mobile device (ranging from phone to tablet) to ease payment. NFC is a short-range high frequency wireless communication technology that enables the exchange of data between devices over about a 10 cm distance.

From the option, Bluetooth look like a probable answer but when they are both compared; we realized that NFC has a shorter set-up time over bluetooth and is therefore faster than bluetooth.

3 0
2 years ago
You receive an email from someone who claims to be a representative from your credit card company. The email asks you to click o
cestrela7 [59]
Here are my definitions of each option:

Spam = Unwanted mail, advertisements, etc

Phishing = Link to a site, usually a fake replica of a legitimate site but with added implements that can be used to spy on you (how people become victims of identity theft

Malware = Usually a malicious piece of code that can be used to slow down your computer or to get a hold of your computer for some other malicious reason

Legitimate = Means that the sender is valid, you know who its coming from, and you know that you won't get attacked by the email

So based on this, I would say that the answer is B. Phishing


3 0
3 years ago
Read 2 more answers
Coffee shops worldwide throw away billions of paper cups each year. Discuss
garik1379 [7]

Answer:

They should give out a coffee cup to each person and charge full price for the first time that you fill the cup but then after they finish the first drink they should offer a discount if you reuse the same cup. They should tell you that you can bring back coffee cups from even a few days ago and you could still be eligible for the discount. This way even people that don't drink as much coffee can still be eligible to get a discount on their coffee.

Explanation:

:)

4 0
2 years ago
Which soft skills would these mobile app developers need to use in the situations described?
Ber [7]

Answer:

1: work ethic/presentation.

2: communication.

3: adaptability.

4: creativity.

(these are all guesses so i'm not 100% sure)

Explanation:

6 0
3 years ago
Read 2 more answers
Text that is heavier or darker than other text in the document is considered _____.
kvv77 [185]

The text that is heavier or darker than other text in a document is considered  Bold.

Hope this helped!~

7 0
3 years ago
Read 2 more answers
Other questions:
  • Dominick has been hired to design a network for Pirate Press. In a paragraph of no less than 125 words, discuss what he needs to
    12·2 answers
  • Which of the following situations would not require knowledge of networking?
    6·1 answer
  • James, a technician, needs to format a new drive on a workstation. He will need to configure read attributes to specific local f
    5·1 answer
  • Write a program that reads raw data from a file that contains an inventory of items. The items should be sorted by name, and the
    12·1 answer
  • 01110101<br> +00100100<br> 00010001
    8·1 answer
  • I want to get an output picture in python but it says this. I'm using turtle
    12·1 answer
  • Find the unknown quantities
    12·1 answer
  • HELLLLLLLLPPPPPPPPPPPP HHHHHHHHHEEEEEEEEELLLLLLPPPPPP MEEEEEEEE
    12·2 answers
  • Which of the following is a characteristic of vector graphics?
    15·2 answers
  • Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addre
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!