1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babunello [35]
3 years ago
5

Which of the following method calls are legal?a. mathMethod(x);b. mathMethod(y);c. mathMethod(x, y);d. mathMethod(x + y);e. math

Method(12L);f. mathMethod(12);g. mathMethod(12.2);h. mathMethod();i. mathMethod(a);j. mathMethod(a / x);
Computers and Technology
1 answer:
Roman55 [17]3 years ago
7 0

Answer:

Option a, b, d, f, and j is legal method calls.

Explanation:

In the given question some information is missing, that is the method definition which can be described as follows:

Method definition:

int x =2, y=3; //defining integer variable

int mathMethod (int x)  //method definition

{//method body

int z=x+y; //calculate value

return z;  //return value

}

In the given question option a, b, d, f, and j  is legal, because these options follow the correct syntax, and other option were incorrect which can be defined as follows:

  • In option c, It is illegal because it accepts only one parameter.
  • In option e, It is accepts long number, that's why it is illegal.
  • In option g, It accepts float value, that's why it is illegal.
  • In option h, It doesn't accepts any parameter.
  • In option i, It isn't use in method.
You might be interested in
What is the most useful advantage of social media in an emergency response effort?
gladu [14]
Being able to communicate directly with constituents.

ability to build situational awareness speed in which information can be delivered directly to the public
4 0
3 years ago
What key stage involves considering design options?
Grace [21]

Answer: Formulating your brief

Explanation:

The key stage that involves considering design options is formulating one's brief.

The aim of "Formulating Your Brief" is simply a way to determine the context in which a particular work will be to be undertaken after which the aim is then defined. It can either be formal or informal.

7 0
3 years ago
In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial insti
elixir [45]

In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial institutions are known as <u>d. cyber terrorists</u>.

<u>Explanation</u>:

Cyber crime means crime committed with the help of computer and internet. Cyber terrorism means crime that causes damage to infrastructure components of financial institutions and government office and causes threat to the society.

Cyber terrorists are person who involve in cyber terrorism. The systems used in the governments and financial institutions should be protected with hardware and software to avoid cyber terrorism.

This kind of cyber terrorism is very dangerous, as they hack the system and destroy the valuable information stored in it.

5 0
3 years ago
A predictive data analyst___.
fgiga [73]

Answer:

C. analyzes data and trends and predicts future data and trends.

Explanation:

Predictive analytics can be defined as a statistical approach which typically involves the use of past and present data ( factual informations) in order to determine unknown events or future performances of a business firm or organization. It is focused on determining what is likely to happen in the future.

For example, a data analyst trying to determine how to effectively stock his company's warehouses incase of an anticipated pandemic and he's using current sales data to project the demands.

Hence, a predictive data analyst is an individual who analyzes data and trends and predicts future data and trends.

3 0
3 years ago
Peer-to-peer systems typically depend on untrusted and volatile computer systems for most of their resources. Trust is a social
TEA [102]
C network connectivity
7 0
3 years ago
Other questions:
  • Which major milestones started off the progression that led to the modern computers we play games on now? What do you think affe
    14·1 answer
  • Categories of functions specified by computer instruction?
    11·1 answer
  • Write a loop that reads strings from standard input where the string is either "land", "air", or "water". The loop terminates wh
    14·1 answer
  • What lets you do many things, like write book reports and stories?
    15·1 answer
  • Which of the following is a good precaution to take when making online purchases? (1 point)
    15·1 answer
  • Grace is performing a penetration test against a client's network and would like to use a tool to assist in automatically execut
    13·2 answers
  • What is the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automa
    8·1 answer
  • Answer this question for points lol
    7·2 answers
  • What is the decimal value for the jump control?
    12·1 answer
  • Each of the flowchart segments in Figure 3-24 is unstructured. Redraw each segment so that it does the same processes under the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!