1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
neonofarm [45]
2 years ago
8

Which of the following does not correctly declare an ArrayList?

Computers and Technology
1 answer:
kotegsom [21]2 years ago
6 0

Answer:

Option b. ArrayList‹Integer› = new ArrayList‹Integer›(10) does not correctly declare an ArrayList.

<u>Explanation</u>:

ArrayList in Java dynamically stores elements in it. It also called as re- sizeable array as it expands  in size when elements are added and decreases when an element is removed from it. This array list class also allows to use duplicate and null values.

The syntax for creating Array list is as follows

ArrayList<Type> obj = new ArrayList<Type>()

Type  specifies the type of ArrayList like Integer, Character, Boolean etc, and obj is the object name. But in the option b ArrayList‹Integer› = new ArrayList‹Integer›(10)  object name is missed and not specified.

You might be interested in
Which is a circuit board located behind an LCD screen on a laptop?
mina [271]

Answer:

Inverter is an electronic circuit that is located behind the LCD screen on a laptop.

Explanation:

Inverter is an electronic device that is used to convert DC voltage into AC voltage. This will lead to control the output power that is required to Liquid Crystal display. The Output power is limit up to the requirement of Florescent light that are used in Liquid crystal display to make picture visible.

This Inverter is just behind the LCD in laptop to control the lights on the display of screen.

4 0
2 years ago
One way to protect against a security threat to a computer system is to __________. Avoid external links with inconsistent URLs
Makovka662 [10]

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs.

<h3>What is malware?</h3>

Malware is any programme that is purposely designed to disrupt a computer, server, client, or computer network, leak private information, obtain unauthorised access to information or systems, deny users access to information, or otherwise interfere with the user's computer security and privacy.

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs. The reason for this is that such links may contain malware or spyware.

Learn more about Malware:

brainly.com/question/14276107

#SPJ1

7 0
2 years ago
The largest value (in hex) that can be loaded into Register A of HCS12 is (Points : 2) 0x8.
andrezito [222]

Answer:

0xFF.

Explanation:

The Register A of HSC12 is an 8-bit register.So the maximum value for 8 bit is 8 1's (11111111). So the decimal value for the maximum 8 bits is 255 but all the options given are in hexadecimal so among the given options only 0xFF has the value of 255 in decimal  F=(1111)₂.So two F's make 8 bits and their decimal value is 255.

7 0
3 years ago
The recheck document button, which resets the spelling and grammar checker to flag previously ignored errors, is located in the
kumpel [21]
The answer is b and c
7 0
3 years ago
What name is used to denote a common field that exists between two tables, but is also the primary key for one of the tables??"
Diano4ka-milaya [45]

Answer:

b. foreign key

Explanation:

In the database world, a foreign key is a field on one table and a primary key for another table. The purpose of a foreign key is to provide linkages between two or more tables. Given two tables A and B, and making A the point of reference, a primary key is a field that is unique in A while a foreign key is unique in B.

On another hand, a composite primary key is a combination of two or more fields/columns on database table that can be used to uniquely identify each row in the table.

In the database lingua, what we have is a unique key not a distinct key, though the two words are similar in meaning.

A duplicate key is used when an information may be repeatedly entered on a table.

So the correct option is a foreign key.

4 0
3 years ago
Other questions:
  • How to connect to my wireless printer for dummies?
    12·1 answer
  • Sara has a habit of stealing money from her brother Charlie. When he found out, Charlie rebuked Sara in the presence of his frie
    11·1 answer
  • The ________ occurs when the user presses the enter key without typing a value for an input operation.
    5·1 answer
  • When using a wireless mouse, what is the most common port used for the transmitter? 
    7·1 answer
  • Sarah is creating and formatting a newsletter for her school. Which page layout rules should she consider when doing this?
    13·2 answers
  • The maximum number of colors that should be used on a slide is _____. 2 4 6 8
    5·1 answer
  • In a relational database, the three basic operations used to develop useful sets of data are:_________.
    14·1 answer
  • What your favorite video game? (Put your user if you wanna play!)
    9·2 answers
  • Select the correct answer from the drop-down menu.
    15·2 answers
  • The area that we can see just after windows is started is subject​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!