1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cupoosta [38]
3 years ago
13

What mistake is in the following code?

Computers and Technology
1 answer:
scoundrel [369]3 years ago
7 0
5. The double should be changed to void.

It says public static DOUBLE mystery()

this means that the method should RETURN A DOUBLE

but the method doesn't. If you change it to void so it looks like

public static void mystery()

then it'll be okay.
You might be interested in
A(n) ________ is a server-based operating system oriented to computer networking and may include directory services, network man
Ganezh [65]

Answer:

Network Operating System (NOS)

Explanation:

A network operating system (NOS) is an operating system that makes different computer devices connect to a common network in order to communicate and share resources with each other using a server. A network operating system can be used by printers, computers, file sever among others, and they are connected together using a local area network. This local area network which they are connected to works as the server.

The NOS also acts as a network security because it could be used as an access control or even user authentication.

There are two types of NOS

1) Peer to peer network operating system.

2) Client/server network operating system

A network operating system (NOS) is a server-based operating system oriented to computer networking and may include directory services, network management, network monitoring, network policies, user group management, network security, and other network-related functions.

4 0
3 years ago
Both IT professionals and governments must apply ethical principles to certify that emerging technologies are to society.
Katarina [22]
The answer is C fair………………………
6 0
2 years ago
True or False: Cracking a Vigenère cipher with brute force takes longer than a Caesar cipher, but it is still a reliable method
iragen [17]

Answer:

False

Explanation:

The Vigenere cipher is an encryption method that uses a series of interwoven Ceaser ciphers and a keyword to encrypt text. The difference between this cipher and the Ceaser cipher is the tabular interwoven Ceaser cipher and the keyword.

Multiple keywords can be used in the Vigenere cipher. The use of this keyword makes the brute-force decipher algorithm unreliable for decoding text encrypted with it.

7 0
3 years ago
What name is given to the assurance that requested information is available to authorized users upon request
mrs_skeptik [129]

Answer:

Availability

Explanation:

With Data availability, it means that we are saying that information is accessible to users. This gives the assurance of the system and also the data being accessible to authenticated users anytime they have the need for it.

It is simply saying that information would be operable by users with authorization whenever they request to.

5 0
3 years ago
The Integrated Services Digital Network (ISDN) sends telephone transmissions across what type of lines?
PtichkaEL [24]

Answer:

The correct answer to the following question will be "Digital".

Explanation:

A digital line seems to be a type of line of communication that requires only binary code for transmission and release.

  • ISDN (Integrated Services Digital Network) is a wireless enterprise-only connection that links a conventional phone system to the telephone line, enhancing the visibility and efficiency of communications.
  • It is indeed a series of connectivity protocols across the conventional networks of the community activated mobile phone network enabling seamless wireless delivery of audio, display, content, and other related services.
6 0
3 years ago
Other questions:
  • Write the function setKthDigit(n, k, d) that takes three integers -- n, k, and d -- where n is a possibly-negative int, k is a n
    9·1 answer
  • R15. Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent f
    8·1 answer
  • To connect multiple usb devices to a single usb port, a ____ can be used.
    12·1 answer
  • William wants to create a document using a DTP. What time-saving techniques can he use?
    9·1 answer
  • Which statement is NOT true:
    9·1 answer
  • Consider five wireless stations, A, B, C, D, and E.
    13·1 answer
  • A legend in Excel is __________.
    10·2 answers
  • Let's practice Audience analysis by going to the Google Merchandise Store demo account with a date range of Feb 1, 2016 - Feb 29
    13·1 answer
  • To calculate subtotal for a table, the first step is to use the ____ button on the table tools design tab.
    15·1 answer
  • WHAT DO YOU KNOW?<br> Why would you want to change your Table<br> Properties?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!