1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
STALIN [3.7K]
4 years ago
11

Assume the availability of class named DateManager that provides a static method, printTodaysDate, that accepts no arguments and

returns no value. Write a statement that calls printTodaysDate.
Computers and Technology
1 answer:
Ira Lisetskai [31]4 years ago
8 0

Answer:

Hi!

The answer is:

<em> </em> DateManager dm = new DateManager(); <em>// Instanciate.</em>

 dm.printTodaysDate; <em>// Calls the method.</em>

Explanation:

If you are working on object-oriented programming, then:

  • First, you have to instanciate the class DataManger.
  • Then, you can call printTodaysDate on the instance dm of DataManager.
You might be interested in
__________ is a website that offers a variety of Internet services from a single, convenient location.
VLD [36.1K]

Answer:

Portal is the correct answer.

Explanation:

A portal is a website that is a web portal which is not just like the website because the web portal provides different things from an individual access point. It also offers its customers or users a variety of services from an individual and convenient location. That's why the following answer is correct.

5 0
3 years ago
⦁ Consider transferring an enormous file of L bytes from Host A to Host B. Assume an MSS of 536 bytes. ⦁ What is the maximum val
timurjin [86]

Answer:

a)  There are approximately  2^32 = 4,294,967,296 possible number of the sequence. This number of the sequence does not increase by one with every number of sequences but by byte number of data transferred. Therefore, the MSS size is insignificant. Thus, it can be inferred that the maximum L value is representable by 2^32 ≈ 4.19 Gbytes.

b)  ceil(2^32 / 536) = 8,012,999

The segment number is 66 bytes of header joined to every segment to get a cumulative sum of 528,857,934 bytes of header. Therefore, overall number of bytes sent will be 2^32 + 528,857,934 =  4.824 × 10^9 bytes.  Thus, we can conclude that the total time taken to send the file will be 249 seconds over a 155~Mbps link.

Explanation:

a)  There are approximately  2^32 = 4,294,967,296 possible number of the sequence. This number of the sequence does not increase by one with every number of sequences but by byte number of data transferred. Therefore, the MSS size is insignificant. Thus, it can be inferred that the maximum L value is representable by 2^32 ≈ 4.19 Gbytes.

b)  ceil(2^32 / 536) = 8,012,999

The segment number is 66 bytes of header joined to every segment to get a cumulative sum of 528,857,934 bytes of header. Therefore, overall number of bytes sent will be 2^32 + 528,857,934 =  4.824 × 10^9 bytes.  Thus, we can conclude that the total time taken to send the file will be 249 seconds over a 155~Mbps link.

8 0
3 years ago
You are writing a device driver for an audio device connected to your computer. Your code needs to determine if the device is bu
Zepler [3.9K]

Answer: hello the options related to your question is missing attached below is the complete question and options

answer : Read the status register ( A )

Explanation:

To determine if the device is busy or ready to accept a new command the line of action is to write a code that will Read the status register. A status register   is a hardware register which contains the information about the processor of the device ( i.e. whether the processor is busy or ready )

5 0
3 years ago
How many times is the coin tossed?
valina [46]

Answer:

100 times.

Explanation:

The code will loop until i is equal to or greater than roles. I starts at zero and increases by one after each toss.

3 0
3 years ago
Read 2 more answers
List 2 negative impacts of cybersecurity.<br><br><br><br>Answer and I will give you brainiliest ​
Nitella [24]

Answer:

Cyber security can be used for good but nevertheless some people will find ways to do bad things. Basically the negative impacts of cyber security is the opposite to the good type of cyber security they take advantage of it and exploit computer system to do what they want. An example to this is planting a malware on the victim's computer or using a DDOS attack on a WiFi router the possibility are endless.

5 0
3 years ago
Other questions:
  • The Change Speed command in Audacity lets you change which two things about a track at the same time?
    9·1 answer
  • Which type of programmer designs programs for applications executed on the internet?
    10·1 answer
  • Write a method called findNames that meets the following specs: It takes two arguments: a list of strings, allNames, and a strin
    12·1 answer
  • Which of the following is not something that consumers need to pay attention to order to make rational choices
    6·2 answers
  • AP CSP - Write a program that takes 10 random numbers from 1 to 12 inclusively and averages them together.
    8·1 answer
  • Why is it important to record audio of silence in the area in which you are filming?
    12·2 answers
  • What is up with the bots? They are so annoying.
    9·2 answers
  • the current food label has been in place for 20 years. the fda has proposed changes to this label for a variety of reasons, such
    7·1 answer
  • Which of the following recommendations should you follow when placing access points to provide wireless access for users within
    8·1 answer
  • What is the definition of Graphic AIDS?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!