1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
3 years ago
5

The methods of the Character class that begin with ____ return a character that has been converted to the stated format.

Computers and Technology
1 answer:
Pavel [41]3 years ago
6 0

Answer:

most probably the answer is 'to'

You might be interested in
Name three actions you should take if you believe you’ve been victimized by crimeware or online fraud
allochka39001 [22]

Try restating system software and delete anything that may have caused the online fraud then remove all credit cards and info on the device. Tell the authorities and get a new device and email with a software protector. When doing this DO NOT DO WHAT YOU ORIGINALLY DID TO GET VICTIMIZED AND (DON'T TRY TO SIGN INTO YOUR PREVIOUS EMAIL ON A NEW DEVICE)  

4 0
3 years ago
Read 2 more answers
Which of the following would be a valid method call for the following method? public static void showProduct (int num1, double n
Alenkinab [10]

Answer:

showProduct(int,double)

for example: showProduct(10,10.5) is the correct answer even showProduct(10,10.0) is also correct but showProduct(10.0,10.5) or showProduct(10,10) or showProduct(10.0,10) are wrong calls.

Explanation:

The code is

  1.       <em>public static void showProduct (int num1, double num2){</em>
  2. <em>       int product;</em>
  3. <em>       product = num1*(int)num2;</em>
  4. <em>       System.out.println("The product is "+product);</em>
  5. <em>       }</em>

showProduct is function which asks for two arguments whenever it is called, first one is integer and second one is of type double which is nothing but decimal point numbers. Generally, in programming languages, 10 is treated as integer but 10.0 is treated as decimal point number, but in real life they are same.

If showProduct( 10,10.0) is called the output will be 'The product is 100'.

Strange fact is that, if you enter showProduct(10,10.5) the output will remain same as 'The product is 100'. This happens because in the 3rd line of code,which is <em>product=num1*(int)num2</em>, (int) is placed before num2 which makes num2 as of type integer, which means whatever the value of num2 two is given, numbers after decimal is erased and only the integer part is used there.

This is necessary in JAVA and many other programming languages as you <u>cannot</u><u> multiply two different datatypes</u> (here one is int and another is double). Either both of them should be of type int or both should be of type double.

3 0
3 years ago
What humidity level should be maintained for computing equipment? a. 50 percent b. 40 percent c. 60 percent d. 30 percent
sashaice [31]

Answer:

A. 50 percent

Explanation:

The correct option is - A. 50 percent

Another preventive measure you can take is to maintain the relative humidity at around 50 percent. Be careful not to increase the humidity too far—to the point where moisture starts to condense on the equipment.

8 0
3 years ago
When do we use an if- statement ​
wel

Answer:

You'd use an if statement if something happens. What I mean is that {If this happens} Then that happens but if the if doesnt happen then the then doesnt happen

Explanation:

3 0
3 years ago
Read 2 more answers
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report
algol13

Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

<h3>Does Apple use the file based encryption?</h3>

It is said that iOS and iPad OS devices are known to often use a file encryption system known to be Data Protection.

Therefore,  Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

Hence option A is correct.

Learn more about encryption from

brainly.com/question/9979590

#SPJ1

3 0
2 years ago
Other questions:
  • a computer that no longer works after having minor repair work done to it may have been damaged by ______.
    6·1 answer
  • What is the primary purpose for a screen saver in windows?
    8·1 answer
  • Developers work together with customers and useras to define requirements and specify what the proposed system will do. If once
    9·1 answer
  • 24 bit or 16 million colors is often called?
    7·1 answer
  • Name types of operating system with example
    5·1 answer
  • Consider the following partial class definitions: public class A1 { public int x; private int y; protected int z; ... } public c
    12·1 answer
  • 9. Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when travel
    9·1 answer
  • Need help ASAP <br><br> Thankss + BRAINLIST only for correct answers
    10·1 answer
  • Write Java code that creates an array of n integers myArray, by taking n integers from the user with duplications, and do the fo
    8·1 answer
  • How many 3 byte sequences contain at least five consecutive 0-bits
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!