1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gwar [14]
4 years ago
10

Write javadoc comments for each of the 7 static methods you just wrote. They should include: a. A one line summary of what the m

ethod does. b. A description of what the program requires to operate and what the result of that operation is.
Computers and Technology
1 answer:
Inga [223]4 years ago
5 0

Answer:

In general, the Javadoc comments are code documentation that offer brief description of a segment of code (e.g. purpose, required input parameter and output)

A sample Javadoc comments is given below:

/**

* Calculate average of a list of number.

* @param myArray -  a list of floating point numbers

*  @return result -  the calculated average of the list of numbers in the array

*/

public static double getAverage(double myArray[] )

{

    // some codes to calculate average

    return result

}

The sample format of the Javadoc above can be applied to document various Java program code.

You might be interested in
There are 10 girls and 8 boys at a party. A cartoonist want to sketch a picture of each boy with each girl. How many sketches ar
kykrilka [37]
80 sketches will be required. It’s just multiplication. Let x=boys and y=girls. If x=8 and y=10, then one boy has to be with one girl. In total 1 boy will be with 10 girls, so that’s 10 sketches. You do the same for boy #2 and so on. It adds up to 80.
3 0
3 years ago
Need help with 4.7 lesson practice
OverLord2011 [107]

Answer:

1.a

2.sorry cant read it that wekk

3.c

Explanation:

7 0
3 years ago
What type of system security malware allows for access to a computer, program, or service without authorization?
olasank [31]

Answer:

"backdoor" is the correct answer for the above question

Explanation:

  • The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.
  • It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.
  • The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.
7 0
3 years ago
How many seconds are required to make a left turn and join traffic?​
Westkost [7]
In town: 5-8 seconds
On highways: 10-20 seconds
8 0
3 years ago
Read 2 more answers
Need help with 3.2 lesson practice questions (edhesive)​
Vinvika [58]

Answer:

<h2>Doesn't have a question</h2>

Explanation:

<h2 /><h2>THANK YOUU</h2>
7 0
3 years ago
Other questions:
  • Most documents are printed in ______ orientation
    9·2 answers
  • While performing maintenance work on the components of a computer, you feel a small electric shock. Before you began working, yo
    5·1 answer
  • When you move a paragraph in a document that includes text with a footnote, what happens to the footnote reference?
    7·2 answers
  • Write a C++ program that overloads a function named LinearSearch that searches an array of data of either integer data type, flo
    8·1 answer
  • What did I do wrong? May you please correct it for me...I was also looking on how to delay when it prints. Like when it prints a
    9·1 answer
  • This program will store roster and rating information for a soccer team. Coaches rate players during tryouts to ensure a balance
    7·1 answer
  • What is the range of addresses for conditional branches in MIPS (K = 1024)?
    6·1 answer
  • The ________ networks operate close to the legitimate free hotspots and typically provide stronger signals
    8·1 answer
  • In an etl process, data is loaded into a final target database such as:______
    14·1 answer
  • us refe rence: so 1 ac 2 2. describe the applications for merged documents in terms of the following benefits 2. describe the ap
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!