1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
3 years ago
7

Write a calling statement for the following code segment in Java: public static int sum(int num1, int num2, String name) { int r

esult = num1 + num2; System.out.println("Hi " + name + ", the two numbers you gave me are: " + num1 + " " + num2); return result; } Function Integer sum(Integer num1, Integer num2, String name) Integer result = num1 + num2 Display "Hi " + name + ", the two numbers you gave me are: ", num1, " ", num2 Return result End Function Write a calling statement to the function in Java or Pseudocode. You may use any value of appropriate data samples to demonstrate your understanding.
Computers and Technology
1 answer:
Pachacha [2.7K]3 years ago
3 0

Answer:

Following are the calling of the given question

public static void main(String[] args) // main function

{

int store; // variable declaration

store = sum(32,15,"san"); // Calling of sum()

System.out.println(" TheValue returned by sum() : "+store); // display

}

Explanation:

Following are the description of the above statement

  • Here is the name of function is sum() In the sum() function definition there are 3 parameter in there signature i.e  two "int" type and 1 is "string" type .
  • In the main function we declared the variable store i,e is used for storing the result of sum() it means it storing the result of value that is returning from the definition of sum() function .
  • After that calling the function by there name and passing three parameter under it  sum(32,15,"san"); and store in the "store" variable.
  • Finally print the value by using system.out.println ().
You might be interested in
What is the point of having bullets points in a text box
Ludmilka [50]
You should have bullets in a text box in case you have a list of stuff. For example:

Computer Parts

.Tower

.Monitor

. Mouse

.Printer


3 0
4 years ago
Help ASAP please ?
mylen [45]
Okay, so since I don't completely understand your question, I'll just try my best to explain each of them.

1. Someone can find your location based on a photo that you posted; If you tagged the location, obviously they can find the location. If you put in the caption where you were when you took the photo, again yes, they would be able to find the location. If you were in a well known location when you took the picture and you can clearly see the background or the setting, with context clues you can figure it out, but as far as the social media platform telling the public where the picture was taken or posted, it is not authorized to give out the location.

2. Colleges use social media during the admission process; Some colleges do check the social media, not all but some. Mostly the platforms where you are most careless, so watch out. You can decide if you want your account to be public or private in the account settings.

3. items posted online can be removed at anytime; yes it can be removed, but depending on how popular the post was, people will still remember it.

4. Things you post online become public information; yes and no. On any and all social media platforms, there is a setting where you can choose the audiences the post reaches. There is the public setting where it's completely public and out into the world, there is the privacy setting where you are the only one who can view it, there is the friends setting where your friends can view your posts, and on some there are the friends/followers except... where you can choose specific people that can't view your post/s, and finally there is the specific friends that can view the post. You can also decide if you want your account in general to be public or private, which you can go into the settings and decide.

5. Employers screen job candidates based on social medias; like number 2 up there, some employers do check your social medias, but if you have you account settings as private they will have to request access.

I hope I helped at least a little! If I didn't i'm sorry i didn't completely understand the question so I tried my best.
If I did help, I'd appreciate it if you would give me brainliest! Thank you!
5 0
3 years ago
Read 2 more answers
Four actions that can be implemented on a database to autocorrect violations of referential integrity, and the outcomes of the a
Paraphin [41]

Answer:

Follows are the matching to this question:

Option \ a \to \ Option \ 3\\\\Option \ b \to \ Option \ 4\\\\Option \ c \to \ Option \ 1\\\\Option \ d \to \ Option \ 2\\

Explanation:

While time-consuming or prone to errors mechanical adjustments to both the referential, databases could be configured with four measures to engine violations. The restricted action causes the insert, update, and removes to only be denied. Set Null to NULL sets the invalid external key, whereas Set Default to a specific core consideration specified in SQL sets a default foreign key. Its Cascade operation spreads the main changes in external keys.

6 0
3 years ago
Help With Sims 4
Norma-Jean [14]

You should probably try removing it one by one if you dont want to get rid of all of it. it might take some time but,,,,

4 0
3 years ago
Is GLaDOS from portal 2 possible?
77julia77 [94]

Answer:

Explanation:Yes Glados 2 is posible.

8 0
4 years ago
Other questions:
  • URGENT!! You decide not to use any recipes or information from the "Don't Be an Animal Murderer" Web site. What characteristic o
    7·2 answers
  • Protected base class members cannot be accessed by: a.friends of the base class.
    6·1 answer
  • Which folders are commonly used in the navigation pane of outlook
    5·1 answer
  • Which statement is true for a career as a graphic designer?
    8·1 answer
  • ANSI defines four events that signal the end of a transaction. Of the following events, which is defined by ANSI as being equiva
    14·1 answer
  • 2) [13 points] You’ve been hired by Banker Bisons to write a C++ console application that determines the number of months to rep
    8·1 answer
  • Which two statements are true about the Data Sync functionality? (Choose two.)
    15·1 answer
  • Pat practices on the keyboard to improve his typing speed. When he typed the sentence It was a rainy day, he missed typing the l
    6·1 answer
  • Select the word or phrase from the drop-down menu to complete each sentence. File names consist of a ______ and a file extension
    10·1 answer
  • 10. Why antivirus is needed to be installed in computer system?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!