1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmainna [20.7K]
3 years ago
6

Consider that the following variables have been declared: int David_Tennant; double Matt_Smith; Which of the following statement

s are valid. Select all that apply.
a. Integer tenth = David_Tennant;
b. (double)David_Tennant = Matt_Smith;
c. Matt_Smith = double(David_Tennant;)
d. Matt_Smith = (double)David_Tennant;
e. Matt_Smith = David_Tennant;



Double eleventh = 11.50;
David_Tennant = eleventh.intValue();
Computers and Technology
1 answer:
earnstyle [38]3 years ago
8 0

Answer:

Double eleventh = 11.50;

David_Tennant = eleventh.intValue();

Explanation:

These two statements are correct. Method intValue() converts Integer to int which is is called unboxing. In this case intValue() method converting Integert part of eleventh variable then storing it in int variable David_Tennant. Output will be 11.

You might be interested in
Which top-level domain can be used by anyone, regardless of their affiliation?
Firdavs [7]

Answer:

C. org

Explanation:

org is an open domain so anyone is allowed to register a .org domain

7 0
2 years ago
Which of these sedimentary rocks is made of the largest particles?
Marta_Voda [28]
Your answer is <span>A.conglomerate.

Hope this helps :)</span>
6 0
3 years ago
Which of the following documents should beprepared before the commencement of a softwareproject?
ludmilkaskok [199]

Answer:

Software requirement specification

Explanation:

requirement specification is the first step before proceeding with any project.

we should validate our output at all phases with software requirement specification

7 0
3 years ago
Privacy laws in other countries are an important concern when performing cloud forensics and investigations. You've been assigne
Klio2033 [76]

Answer:

See the explanation for the answer.

Explanation:

Australian regulations makes extremely difficult for the enterprises to move organizations sensitive data to the cloud which is storing outside the Australian network. These are all managed by the Office of Australian Information Commissioner(OAIC) which provides oversight on the data privacy regulations designed to govern the dissemination of the sensitive information.

One rule they applied under this is The Australian National Privacy Act 1988 which tells how the organizations collect, use, secure, store the information. The National Privacy Principles in the Act tells how organizations should use the people's personal information. The NPP has a rule that An organization must take the responsibility to hold the information without misuse or modified by unauthorized access. They require enterprises to put security service level agreements with the cloud service providers that define audit rights, data location, access rights when there is cross border disclosure of information.

In later time they introduced a new principle called The Privacy Amendment Act 2012. This principle gives set of new rules along with the changes in the many rules in the previous act and also this is having a set of new principles those are called Australian Privacy Principles (APP).

In this there is principle for cross border disclosure of personal information which is APP8. This rule regulates the disclosure or transfer of personal information by an agency or company to a different location outside the country.

Before disclosure the information outside they have to take responsible steps that the company outside the Australia must not breach the APP 's.

3 0
3 years ago
Al these are benefits of computer literacy except
Harrizon [31]

Explanation:

  • Being computer literate supports entrepreneurship. ...
  • Communication. ...
  • Enhance your employment opportunities. ...
  • Address the gap in your knowledge. ...
  • Computers Reconstruct Business
8 0
2 years ago
Other questions:
  • What are some things you can do with labels in Word? Check all that apply. make them include audio print them on the inside of t
    13·1 answer
  • What does DKIM stand for?
    9·2 answers
  • The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:__________.
    6·1 answer
  • What steps might a company or organization need take in order to keep its digital data secure online?
    8·1 answer
  • Why won't my ads load brainly? Is anyone else having this problem? Brainly company or whoever you are that is running this websi
    6·2 answers
  • PLEASE HURRY 30 POINTS
    15·2 answers
  • What is DMTS. Explain it​
    10·2 answers
  • Which of the following is NOT a type of insurance fraud?
    14·2 answers
  • Calculate the average high and low in python code for beginners pls
    5·1 answer
  • WHICH PROGRAMMING LANGUAGES ARE THE BEST AND COMPATIBLE FOR 3D PRINTERS?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!