1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Troyanec [42]
3 years ago
15

Assume that the following method header is for a method in class A.

Computers and Technology
1 answer:
fenix001 [56]3 years ago
8 0

Answer:

The answer to the given question is option "B".

Explanation:

In the question it is given that there is a method name is "displayValue()" is defined in this method we pass an integer variable that is "value" and in this method, we calculate some values, and call this method So, the correct code for calling this method is the option "B" and others options are not correct that can be described as:

  • In option, A Calling time of the function we do not use the return type, That's why this option is not correct.
  • In option, C Calling time of the function we do not pass any data type of variable, That's why this option is not correct.
  • In option, D we do not use semicolon in the function call, which is wrong.

That's why option "B" is correct.

You might be interested in
Your boss asks you to transmit a small file that includes sensitive personnel data to a server on the network. The server is run
mel-nik [20]

Answer:

a. Telnet transmissions are not encrypted.

Explanation:

Indeed, since <em>Telnet transmissions are not encrypted,</em> all the information sent, and even the characters typed in the telnet console are sent in clear text.

This is a security issue, since any other device in the same network will receive a copy of the information (packets) sent. For default, all the devices, except for the server expecting to receive the information, will discard the packets. However it is easy to actively <em>listen </em>and keep those packets, wich will contain the information in plain text and human readable.

4 0
3 years ago
Explain the RISC and CISC architecture. Comparison of RISC and CISC in detail.
puteri [66]

Answer:RISC(reduced instruction set computer) is the computer used for low level operation by simple command splited into numerous instructions in single clock only and CISC(Complex instruction set computer) is the computer that performs the operation in single instruction.

RISC architecture has hardwired control unit,data cache unit,data path ,instruction cache and main memory as components .CISC architecture persist of  control unit,micro program control memory, cache, instruction and data path and main memory.

The differences between RISC and CISC are as follows:-

  • The instruction in RISC are less and and low complexes while CISC has several number of complex instruction.
  • The calculation done by RISC are precise and quick whereas CISC has slightly slow calculation processing.
  • The execution of RISC is faster as compared to CISC.
  • RISC uses hardware component for implementation of instruction because it does not persist its own memory and CISC implements instructions using its own memory unit .

6 0
3 years ago
What value will be stored in the variable t after each of the following statements
olga55 [171]

Answer:

A) t = true

B) t = false

C) t = false

D) t = true

Explanation:

Part A, here 12 is greater than 1 so the condition is true.That is why "t" will hold "true".Part B, here 0 is not greater than 2 so this condition fails.Therefore "t" will hold "false" in this case.Part C,3*2=6 and we are comparing 5 with 6  Therefore condition fails here.That is why "t" will hold "false".Part D, here  we are comparing 5 with 5 and both are equal.So "t" will hold "true".

7 0
3 years ago
Advanced Communications, a leading mobile communication service provider, has a deal with On-the-Go, a chain of several thousand
Stells [14]

Answer:

The answer is "Strategic alliance"

Explanation:

These alliances are an indo-organizational type in which several trading stakeholders decide to put resources, transfer knowledge. It also collaborates in environmentally friendly-nomic price-creating exercises.

  • In this alliances major mobile phone service provider, Advanced Phone has a contract with On-the-Go, a chain of several thousand convenience stores nationwide.
  • It depends on synergy in both the assets and technical expertise to introduce to those of the partnership by any of the trade members, that's why the strategic alliance is the correct answer.

3 0
3 years ago
Data collection begins only after completing the research design process. after determining whether there are any objections. wh
Ivahew [28]

Answer:

Data collection begins only

after completing the research design process.

Explanation:

The nature of the research problem and design process provides the basis for data collection.  Data collection can be carried out from primary or secondary sources or both.  The collection system will indicate if the research is exploratory, descriptive, or conclusive.  Data collection provides an important way to understand the characteristics of the research interest.  A clear definition of the research interest is provided by a correct research question, which also provides focus and direction for the study.

8 0
3 years ago
Other questions:
  • Todd, a travel agent, lost his job due to no need for his skill. This is an example of what type of unemployment?
    12·1 answer
  • The first documented use of work release was in the ____.
    13·1 answer
  • A python programmer is writing a function definition. What syntax should be used?
    6·1 answer
  • The position of a _____ is a nontechnical position responsible for defining and implementing consistent principles for setting d
    15·1 answer
  • 8.5 question 2 edhesive
    11·1 answer
  • There will be 10 numbers stored contiguously in the computer at location x 7000 . Write a complete LC-3 program, starting at loc
    14·2 answers
  • Suppose that f is a function with a prototype like this: void f(________ head_ptr); // Precondition: head_ptr is a head pointer
    6·1 answer
  • 1. Which of the following is not related to a buffer overflow? A. Static buffer overflow B. Index error C. Canonicalization erro
    10·1 answer
  • Create an application (that uses the SortedABList) that allows a user to enter a list of countries that he or she has visited an
    11·1 answer
  • MORE FREEE POINTS AYEEE
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!