1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
3 years ago
8

Which one of the following is a correct declaration for a method named passAList that has as arguments an array list myList of s

ize 10 and an integer array intArr of size 20, and that modifies the contents of myList and intArr?
Computers and Technology
1 answer:
alekssr [168]3 years ago
3 0

Answer:

"public static void passAList(ArrayList<Integer> myList, int[] intArr)", is the correct answer for the above question.

Explanation:

Missing information :

  • The option is missing but the question states "choose from the following". The correct defining syntax is defined above.

Detailed Explantion :

  • The above question asked about syntax which takes the value of list and array as an argument.
  • It is already defined in the above syntax.
  • And the value is passed by the user at the time of function call.
  • The array list is defined by the help of the ArrayList class and the array is defined by the help of the "[]" symbol.

You might be interested in
What is a relational database management system and how does it relate to a database administrator?
nydimaria [60]

Answer: A database management system tends to support administration, development, and use of the platforms. A Relation Database Management System (RDBMS) is referred to as a type of Database Management System (DBMS) that consists of a structure(row-based table) that tends to connect data elements and also involve functions that are supposed to maintain accuracy, security, consistency and integrity of the data.

6 0
4 years ago
All of the following are U.S.-EU data privacy requirements except:
Montano1993 [528]

Answer:

b. Redundant hardware and data backup systems

Explanation:

Data privacy is important where a company collects, processes and stores personal information.In the US-EU have laid down regulations to ensure data privacy is maintained. It is a requirement before collection of personal data, to clearly state why the data is being collected and how it will be used.The individuals whose data is being processed have a right to access their data at no cost during processing . Of great importance is the security of the data so as to maintain its integrity, Companies are required to take steps in protecting the data from unauthorized access, processing and accidental loss.redundant hardware and data backup system are used by companies as a fail-safe mechanism in data protection but they are not a requirement in data privacy, although they enhance it.

8 0
3 years ago
you are presenting with two monitors. which view displays a preview of the next slide and speaker notes on the second monitor?
Helga [31]
The preview would be constructed by putting the next slide monitor on the left and the speaker notes on the name of the dominant hand… the right.
5 0
3 years ago
What happens if a computer has a virus that cant be deleted?
sveta [45]
Then the computer is broken. But what you can do is wipe everything on it and that kills the virus. If it's a blue screen of death then you need a computer genius to type some code and delete the blue screen of death. However if it is a Trojan virus there is no way of get tut rid of it
7 0
3 years ago
Read 2 more answers
Quick!! Im taking a timed test so pls hurry!! Ill even mark as brainliets!!
Firdavs [7]

Answer:

he has a lot of experience or he is willing to be trained

Explanation:

any of the 2 choose the one u want...

7 0
3 years ago
Other questions:
  • Write a program to do the following: Load $t0 with 12 and call it x. Load 21 in $t1 and denote it as y. Finally, load 32 in $t2
    14·1 answer
  • A variable used as a subscript should be initialized to ________.
    12·1 answer
  • In a formatted text file, ________ signal(s) the beginning and end of a formatting command.
    12·1 answer
  • If Number = 7, what will be displayed after code corresponding to the following pseudocode is run? (In the answer options, new l
    5·1 answer
  • You are trying to access the Wi-Fi network at a coffee shop. What protocol will this type of wireless networking most likely use
    11·1 answer
  • When an attacker promotes themselves as reputable third-party advertisers to distribute their malware through the Web ads,
    15·1 answer
  • An image can be copied from the Internet or another location and pasted into Paint.
    13·1 answer
  • What are three key characteristics of an OS process?
    11·1 answer
  • Create a multimedia project that contains the text element and all the contents that you have studied about that element
    13·1 answer
  • We can save our data peremently on a
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!