1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slamgirl [31]
3 years ago
10

Java allows you to declare methods with the same name in a class. this is called

Computers and Technology
1 answer:
Tanzania [10]3 years ago
8 0
Polymorphism. Understand: you can have the same names, but the arguments HAVE to be different so that in the bytecode the signatures are unique.
You might be interested in
Why are laptop employment of computer popular these days​
steposvetlana [31]

Answer:

Because due to pandemic all the offices and employment sector are closed physically and to make their work smoothly people are preferring virtual platforms with the concept of work from home .

I hope it is helpful and mark me as brainlest and follow me plllzzz♥️♥️

7 0
3 years ago
2.13.4 Colorful Caterpillarhel ????
exis [7]

Answer:

sorry don't know :(8685

3 0
3 years ago
What will happen when users attempt to connect via Telnet or SSH for enable mode when neither the enable secret password command
vovikov84 [41]

<u>Attempt to connect via Telnet or SSH for enable mode:</u>

  • Normally telnet and SSH ism to used login to network socket. Basically to login user is prompted with password and verified.
  • Secret password is one more level to login to access the network.
  • It is used to login copy files to web server so that website pages are update. End user can copy or move the files from web server or cloud computer or UNIX servers.
  • Enable secret password if it is configured, end user login with encrypted technology and plain text format is displayed.
  • Different between enable secret and enable password is enable secret is encrypted and enable password is not encryption and plain text.
6 0
3 years ago
What is the smallest integer n (stored as a floating point value) such that n + 1.0 - n will produce 0.0 for: a) Single-precisio
Vedmedyk [2.9K]

Answer: The FP-s are stored as sign (1.)111111111111 - number of bits.

Also 24 bits resolution there can be 23 zeros

Explanation:

The –1·2²⁴ might be stored as -1 · 1.00000000000000000000000(1 ←the 2⁰), it depends on how the FFP “engine” manages this, it may also be code specific a n+1–n does return 1 but 1–n+n does not. you should carry out a test for a specific compiler/computer

This is what javascript does with double (k+=1; n-=1) e.g

the (k+=2; n-=2) should be used to pass ±0x20000000000000

4 0
3 years ago
Consider the following scenario. The Current State of One Particular ArrayList The capacity of a particular ArrayList is five (5
pshichka [43]

Answer:

The ArrayList initial functionality is 5, there were 4 components.

Then, add 25 more elements by using add()calling 25 times So total number of elements after the completed operation would be 4 + 25= 29.

5th component will be introduced without calling ensureCapacity(); while adding 6th element-> ensureCapacity(2* 5+ 1) it will call, making the capacity 11.

So ArrayList's capacity will be 11.

Next 7th to 11th components will also be added automatically once the 12th element is added, it will name ensureCapacity(2* 11+ 1) and make the capacity 23.

While adding 24th dimension, ensureCapacity(2* 23+ 1) will be called again and this will make the capacity 47.

There will therefore be 3 (three) calls to ensure the feature Ability).  

Elements of Rest 25th to 29th will be added seamlessly as ability becomes 47.

3 0
3 years ago
Other questions:
  • Categories of functions specified by computer instruction?
    11·1 answer
  • What is ment by creative middle way solution
    6·1 answer
  • What statement would you use to print the phrase Hello, world and then start a new line?
    8·1 answer
  • What exactly does the value recorded in a single dimension of a sift keypoint descriptor signify?
    15·1 answer
  • ____ is typically used with lans that have a star topology and can be used in conjunction with twisted-pair, coaxial, or fiber-o
    12·1 answer
  • The graph of which function has an axis of symmetry at x=-1/4​
    15·1 answer
  • Which of the following is most likely to be considered plagiarism? a. Intentionally reporting the results of inaccurate statisti
    11·1 answer
  • To display “ hello ” message on the screen
    14·1 answer
  • When you create names for the elements of a webpage (such as ), what are some rules that you can follow to make your HTML code e
    13·2 answers
  • 3. Which swim_backwards method is called when sammy.swim_backwards() is executed? Why?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!