1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KATRIN_1 [288]
3 years ago
9

Which of the following types does the Java programming language support?

Computers and Technology
2 answers:
gtnhenbr [62]3 years ago
4 0

Answer:

The correct answer for the given question is option(b) i. e "Integer" and option(c) i.e "Object".

Explanation:

The  Integer is a wrapper class for int data type in the java programming language, The integer provides more flexibility in storing the data and manipulating the data .

The syntax of using Integer type is given below

Integer variable_name = new Integer("value");

For example

Integer a1 = new Integer("12") ;

Object is the class  in java programming language which is present in java.lang package. Object also describe the return type of the java constructor.

sasho [114]3 years ago
4 0

Answer:

b. Integer

c. Object

Explanation:

Among the given options Java supports Integer and Object types.

Integer is the type for declaring integer value.You can declare a variable integer by writing int in front of it.There are no packages of the integer and object.

Objects are the combination of the data given and the procedure that can be used to work on the data that is available.

You might be interested in
What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
____ [38]

Answer:

Monitor

Power supply

Explanation:

Monitor is the display unit of the computer. It carries capacitors which are charged and helps in electronic display.

Power supply is the unit which converts the AC electric supply to DC supply. It utilizes the capacitors to perform this function

While the hard drive and video card does not contain any capacitors.

4 0
3 years ago
An example of live footage is when?
Zigmanuir [339]
A example of live footage is on camera, tv, or a live show happening at that moment 
6 0
3 years ago
Read 2 more answers
Which of the following tasks is least effective at preventing a computer virus?
worty [1.4K]
Anti-virus software is set to scan your computer weekly is the least effective.
3 0
3 years ago
Read 2 more answers
Which CSS attribute would change an element's font color to blue? font-color: blue; background: blue; color: blue; background-co
olchik [2.2K]
The Answer is color:blue for changing an element's font color to blue
8 0
3 years ago
Read 2 more answers
Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities
kherson [118]

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

7 0
3 years ago
Other questions:
  • Running fewer applications at once is a way to resolve which type of bottleneck?
    9·1 answer
  • The term ________ refers to the use of a single unifying device that handles media, internet, entertainment, and telephone needs
    13·1 answer
  • ANSWER THIS CORRECTLY FOR BRAINLIEST
    13·2 answers
  • The type of database that is connected by a company's local area networks is a(n:
    11·1 answer
  • For every $1 of deposits, the banks can increase ________________ by the value of the Money Multiplier.
    15·1 answer
  • Write a program that prints the numbers 1 to 4 on the sameline with each pair of adjacent numbers separated by a single space(1
    5·1 answer
  • A class is a _____, which encapsulates _____ and _____. (Points : 2) programming language construct; attributes; behavior
    7·1 answer
  • Please help thank you !!!
    7·2 answers
  • Tạo thủ tục có tên _Pro04 để trả về số lượng tổng thời gian tham gia dự án Y của nhân viên có mã số X, với X là tham số đầu vào,
    5·1 answer
  • How ict tools changed the way we live explain it​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!