1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
patriot [66]
4 years ago
8

Write a statement that declares a prototype for a function minMax, which has five parameters. The first three parameters are int

egers. The last two are parameters that are set by the function to the largest and smallest of the values of the first three parameters. The function does not return a value.
Computers and Technology
1 answer:
Mice21 [21]4 years ago
6 0

Answer:

   public static void minMax(int num1, int num2, int num3, int smallest, int largest){

   }

Explanation:

  • The function declaration above is in Java programming Language
  • The access modifier (public) is optional it could be private as well
  • static because it is found within same class as the main method
  • void because it will return no value
  • The parenthesis contain the parameters as specified by the question
You might be interested in
7) through: (0, 4) and (-1,0)​
Andreyy89

Answer:

its 5

Explanation:

7 0
3 years ago
What is a quick way to determine if a site might contain reliable information? looking at the title of the webpage reading the f
kvasek [131]

The answer is checking the URL.  

Looking at the URL or the web address of the website will help you determine  whether the site contains reliable and credible information or not. Domain names like .edu and .gov are usually trusted sites. What you are looking for are sites with trusted institutions that have a proven record of integrity and reliability. Domain type should always match the content. For example, .edu should have educational material.  By checking the URL, You’ll also be able to establish the person’s name or the agency that published the article.  


8 0
4 years ago
Read 2 more answers
Which is an operational process performed by AWS for data security? a.Background virus scans of EBS volumes and EBS snapshots
Tresset [83]

Answer:

B. All decommissioned magnetic storage devices are degaussed and physically destroyed in accordance with industry-standard practices.

Explanation:

6 0
3 years ago
Which printing options are available in the Print menu? Check all that apply.
sasho [114]

1

3

4

6

mam nadzieje że pomogłem                                                  

6 0
3 years ago
Read 2 more answers
Which behaviors might lead someone to have a low credit score?
stepladder [879]
A is the correct answer. You build credit by using credit cards and paying your bills on time.
4 0
3 years ago
Other questions:
  • A college meal plan allows students to:
    7·2 answers
  • A computer ____ is the amount of data (measured in bits or bytes) that a cpu can manipulate at one time
    8·1 answer
  • The process of saving files to disk is called.<br> A.read<br> B. Write<br> C. Lock<br> D. Protect
    6·1 answer
  • alina is preparing to scan a microsoft sql server database server for open ports. what port should she expect to find supporting
    12·2 answers
  • Which of the following is the best way to locate books and research from all over the United States and abroad?
    9·2 answers
  • I NEED THIS ASAP
    12·2 answers
  • The Danger zone around a robot is?
    13·2 answers
  • 1 Which one of the following is a transmission
    9·1 answer
  • 1. A cell is identified by its ........
    8·1 answer
  • 2. Name the substance you think is in the cylinder that you cannot see and prevents the plunger from going all the way in even w
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!