1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alik [6]
3 years ago
14

Write the definition of a function square, which receives an integer parameter and returns the square of the value of the parame

ter. So if the parameter's value is 7, the function returns the value 49. If the parameter's value happens to be 25, the functions returns the value 625. If the value of the parameter is 0, the function returns 0.
Computers and Technology
1 answer:
MatroZZZ [7]3 years ago
5 0

Answer:

public static int square(int num){

       return num*num;

   }

Explanation:

Using the Java Programming Language, we declare a function named square as stated in the question, the return type of the function is stated as integer. And the the parameter it receives is an integer number called num.

To get the square of the number we use the expression num*num, and return the the squared value. When the function is called, it will receive one argument (an integer value), it will calculate the square and return it.

You might be interested in
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
gavmur [86]

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

4 0
3 years ago
Why do you think that backlighting is used in so much of Sheldon’s photography?
Marianna [84]

Answer:

So you see the person better

Explanation:

4 0
4 years ago
Read 2 more answers
Should a social network own our social data? Is it an invasion of privacy for social networks to collect and use the information
Svetradugi [14.3K]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

No, we don't even own our identity data on social networking sites. It may be said as permission is needed as an factor for recognizing an acceptable interpretation and solution to a circumstance as well as a method to be followed.

  • They would conclude that, in contemplating the data generated from social networking, this could be recognized that although the data that they left as our electronic fingerprints must be used with applications that can provide the businesses with the appropriate strategy to best reach the consumer.
  • With all this into consideration, the method of information gathering does not include personal identifying information, and also the reality that we must be made mindful of what details has been accessed as well as the right to get out of obtaining such details from the social platform.
3 0
3 years ago
Jacob develops a new app that will display the current weather centered on a user's location and notify the user in the case of
____ [38]

Answer:

C GIVE ME BRAINLEST

Explanation:

5 0
3 years ago
Read 2 more answers
If i'm watching a show on netflix without any extra speakers besides the normal one on my tv, what setting should i use? English
sweet-ann [11.9K]
5.1 is higher quality
8 0
3 years ago
Read 2 more answers
Other questions:
  • Perform online research and learn about the elements of a presentation program interface not discussed in the lesson. Write a sh
    9·1 answer
  • What is the danger in judging someone according to his or her social networking profile
    12·1 answer
  • How do u feel about distance learning in a paragraph?
    6·2 answers
  • Imagine that you are preparing a series of bitmap graphics for a Website. To decrease the download time for each graphic, you ca
    5·1 answer
  • True or False?Only flying unmanned aircraft over 20lbs requires preparation and safety calculations.
    8·1 answer
  • ACME Corp. is developing a software program that can run on mobile devices so that customers can interact with the firm, view pr
    13·1 answer
  • Power supply, keyboard, monitor, mouse,ROM,CPU are belongs to Output, Input or Storage device​
    7·1 answer
  • Which of the following are pointers?
    9·1 answer
  • You can put ______ on your phone.
    10·1 answer
  • What do you think is the most effective way to ensure that code adheres to good coding standards.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!