1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
docker41 [41]
4 years ago
5

PreparedStatement ps = connection.prepareStatement("select firstName, mi, lastName from Student where lastName = ?"; ps.setStrin

g(1, "Smith"); ResultSet resultSet = ps.executeQuery(); System.out.println(resultSet.getString(1)); What would be the result?\
Computers and Technology
1 answer:
labwork [276]4 years ago
7 0

Answer:

The answer to this question can be given as:

In this code, there will be a run-time error.

Explanation:

In the java (database code) this code will have a run-time error because the cursor in resultSet that is the object of the resultSet class does not point any row. we must use resultSet.next() function to pass the cursor to the first row in the resultSet. Finally, resultSet.next() function passes the cursor to the next row in the resultSet class object.

You might be interested in
Pseudocode of creating a program to convert to IEEE 754 to a real number
Eduardwww [97]

Answer:

  • Step1: Check If the number is Positive or Negative.  
  • Step2: If it is positive then save the sign of it as 0.  
  • Step3: If it is negative then save the sign of it as 1.
  • Step4: Covert the negative number to Positive.
  • Step5: Convert the IEEE 754 to Binary.
  • Step6: convert the integer part into binary form  
  • Step7: Convert fractional part into binary form
  • Step8: To convert Integer part, Devide the number by 2 and note down the reminder and Keep deviding unless dividend is less than 2
  • Step9: copy all the reminders together
  • Step10: Multiply decimal part by 2 unless fractional part is 0.
  • Step11: By noting down integral part, keep multiplying decimal part by new value of 2 untill perfect number is reached.
  • Step6: Find the Mantissa.
  • Step7: Concatinate the Sign, exponent and the mantissa.

Explanation:

For Example : 20.75

First step (converting 50 (in base 10) to binary):

  • No is Positive
  • By dividing 20 by 2, which gives 10 with no remainder 0.
  • Now Devide 10 by 2, which gives 5 with a remainder of 0.
  • Now Devide 5 by 2, which gives 2 the reminder as 1
  • Now Devide 2 by 2, which gives 1 with reminder as 0
  • Now devide 1 by 2, which gives 0 with reminder as 1
  • We read the result from bottom to top  which is 10100

Second part is to convert 0.75 to binary:

  • We have to multiply 0.75 by 2, which gives 1.5. We keep only the integer part, which is 1.  
  • Now, we do 1.5 - 1, which gives 0.5. Now, We multiply 0.5 by 2, which gives 1.  
  • Now we do 1 - 1, which gives 0.
  • Reading from Top to bottom will give 110

Final Answer is : 10100.110

8 0
3 years ago
Alice's public key, and sends back the number R encrypted with his private key. Alice decrypts the message and verifies that the
Agata [3.3K]

There are different kinds of keys. The identities of Alice and Bob are verified in this protocol.

<h3>What is public and private key in SSL?</h3>

These keys are known to be a kind of related pair of text files and they are often made together as a pair if one makes their Certificate Signing Request (CSR).

Note that the private key is different file that is often used in the encryption/decryption of data so as to sent a file between one's server and the connecting clients.

Learn more about  public/private key from

brainly.com/question/8782374

3 0
2 years ago
Which wireless standard can stream data at a rate of up to 54 mbps using a frequency of 5 ghz?.
sleet_krkn [62]

Answer:

802.11a

Explanation:

4 0
3 years ago
Which line of code could be used for a constructor?
uysha [10]

Explanation:

I think (first name last name id Num)

4 0
3 years ago
2. What are some other reasons why you might need to know the operating system version on your computer or mobile device
mote1985 [20]
1. To check compatibility of an app/ software
2. To know the vulnerabilities
3. To be aware of available system updates
Hope that helps
7 0
2 years ago
Other questions:
  • Which best describes the Big Bang Theory?
    12·2 answers
  • Use the Web to search for different ways to share an Access database, such as the one for Colonial Adventure Tours, with others
    7·1 answer
  • When command is transferred, the process should include a(n): A. Detailed Lesson Learned Report B. Intelligence Report C. Award
    11·2 answers
  • Generate an array x that has n=100 random numbers that are uniformly distributed over the interval [0,1) . Look up how to use th
    8·1 answer
  • Which of the following types of memory extends the actual physical memory of a computer by copying blocks of data from the memor
    11·1 answer
  • A television advertisement claiming that a product is "light-years ahead of its time" does not make sense because (a) it doesn’t
    10·1 answer
  • How long will it take Lola to travel from Paris to nice?
    8·1 answer
  • Mightier than the waves of the sea is his love for you
    13·1 answer
  • A(n) ____________ calculator is a device that assists in the process of numeric calculations but requires the human operator to
    13·1 answer
  • You are given the following design parameters, fill in the table: All memory addresses are 32-bit long; A 64Kbyte (2^16 byte) ca
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!