1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kozerog [31]
3 years ago
11

Help ME! Will Mark BRAINLIEST! Its Engineering!

Computers and Technology
1 answer:
Anettt [7]3 years ago
5 0
What is it about ? And what you need help on
You might be interested in
What are some things you can do with labels in Word? Check all that apply. make them include audio print them on the inside of t
____ [38]

Answer:

word does  not support audio, so its not A, but you can customize them, so its probably C

Explanation:

7 0
3 years ago
Write the definitions for three function named max. Each receives two parameters, of the same type, and returns the larger of th
GenaCL600 [577]

Answer:

The method definition to this question can be given as:

Method definition:

double max(double x, double y)  //define method with double parameter  

{

if (x>=y)    //check condition.

return x;  //return value

else

return y;     //return value

}

double max(int x, int y)    //define method with integer parameter

{

if (x>=y)    //check condition

return x;    //return value

else

return y;  //return value

}

double max(char x, char y)   //define method with char parameter

{

if (x>=y)    //check condition

return x;    //return value

else

return y;    //return value

}

Explanation:

The above method definition can be described as below:

  • In the first method definition first, we define a method that is "max()". In this method we pass two variables as a parameter that is "x and y" and the datatype of this is double. Then we use a conditional statement. In the if block we check if variable x is greater then equal to y then it will return x else it will return y.  
  • In the second method definition, we define a method that is same as the first method name but in this method, we pass two integer variable that is "x and y". Then we use a conditional statement. In the if block we check if variable x is greater then equal to y then it will return x else it will return y.
  • In the third method definition, we define a method that is same as the first and second method name but in this method, we pass two char variable that is "x and y". Then we use a conditional statement. In the if block we check if variable x is greater then equal to y then it will return x else it will return y.
8 0
3 years ago
How is science and technology related?
garik1379 [7]
Because you use technology to do science
3 0
3 years ago
Read 2 more answers
Which of the following is a narrative essay most like
Nataliya [291]
The answer if defiantly B. Story

4 0
3 years ago
Read 2 more answers
Why does Phone Manufacturers make more than FHD Screen?
Ulleksa [173]
Phone screens are smaller, but are apparently more HD than a full, widescreen TV. Why? The pixels are small but they can fit in just that little screen space, but is harder to fit onto a relatively gigantic TV screen.
5 0
3 years ago
Other questions:
  • You can apply bold, italic, and underline styles to text. But why is it a good idea to use underline sparingly?
    13·2 answers
  • What are the main purposes of regulatory policies? Check all that apply.
    5·2 answers
  • Carlos own a hardware store.He currently is not using any software to track what he has in the store. .In one to two sentences,
    10·1 answer
  • Explain the computer according to size​
    10·1 answer
  • _______________ ________________ have human editors that evaluate, select, and organize websites into a hierarchy of categories.
    11·1 answer
  • What is computer system<br>explain the role of bank in computer<br>​
    15·2 answers
  • Identify five type of application software​
    12·2 answers
  • Assume that students in a course are required to produce a written report on an ICT-related
    14·1 answer
  • Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and ins
    10·1 answer
  • Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ____.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!