1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
4 years ago
11

What does the following statement do? double[] array1 = new double[10]; A. Declares array1 to be a reference to an array of doub

le values B. Creates an instance of an array of 10 double values C. Will allow valid subscripts in the range of 0 - 9 D. All of the above
Computers and Technology
1 answer:
Crank4 years ago
7 0

Answer:

The answer is "Option D".

Explanation:

In the given code an array that is "array1" is declared that stores double value because its data type is double. This array stores 10 element, that is equal, and between 0 to 9, because array indexing always starts from 0. In the given array declaration code all options are correct, that can be described as follows:

  • In option A, It is correct, because all element stores double value.
  • In option B, It is correct, because the size of the array is 10.
  • In option C, It is also correct, because it ranges between 0 to 9.
You might be interested in
_______ is a very common approach to multisystem authorization.
mart [117]

Password is a very common approach to multisystem authorization. Passwords can be made up of a combination of letters, numbers, and special characters.

Anyone who has used a computer knows how to use a password, which is the most commonly used authentication method. Password-based authentication is the most simple for adversaries to exploit. Passwords are frequently reused, and guessable passwords are created using dictionary words and publicly available personal information. Two-factor authentication (2FA) is a security system that requires two distinct forms of identification to gain access to something. The first factor is usually a password, and the second is usually a text message with a code sent to our smartphone, or biometrics such as your fingerprint, face, or retina.

Learn more about password here-

brainly.com/question/14580131

#SPJ4

7 0
1 year ago
Which of the following is a unique feature of credit unions?
Alecsey [184]

A list of multiple answers is provided;

 

<span>a)      </span>Credit unions are typically owned and run by their members

<span>b)      </span>Credit unions limit membership to certain people or groups

<span>c)       </span>Credit unions offer a wide variety of banking services

<span>d)      </span>Both A & B

 

The answer is both (D) Both A & B

 

As compared to banks, credit unions are small in size and are created, owned and operated by their members or participants. They are non-for-profit financial cooperatives and are structured to serve a particular region. Thus, membership in majority of credit unions is that you have to live in the area. You may also be able to join based on other various factors like Employer and family.

6 0
3 years ago
A company has a network printer that is utilzed by several departments. Although the printer shows online and other departments
Aloiza [94]

Answer: c. The security settings for the print spooler need to be modified to include the department.

Explanation:

The print spooler makes Windows computer enable to interact with the printer, and to commands the printer for print jobs .

If all the other departments can access the printer,  but not the accounting group, then the technician should check the security settings for the print spooler and modify it accordingly to include the accounting group  .

Hence, the correct answer is c. The security settings for the print spooler need to be modified to include the department.

4 0
4 years ago
Does magnifier count as assistive technology
PtichkaEL [24]
The correct answer: Yes

Assistive technology<span> is an </span>umbrella term<span> that includes assistive, adaptive, and rehabilitative devices for </span>people with disabilities<span> and also includes the process used in selecting, locating, and using them. Assistive technology promotes greater independence by enabling people to perform tasks that they were formerly unable to accomplish, or had great difficulty accomplishing, by providing enhancements to, or changing methods of interacting with, the </span>technology<span> needed to accomplish such tasks.
</span>
Magnification falls in this criteria. Therefore, we can conclude that magnification is an assistive technology which can be used to help end users see small objects in in their displays.
3 0
4 years ago
PLEASE IM IN AN EXAM I NEED HELP ASAPPP<br> (Appshed question)
Anika [276]
Home Screen with pop up so it’s the first one
6 0
3 years ago
Read 2 more answers
Other questions:
  • Neighbor discovery performs many of the functions that icmp router discovery and icmp ____ handled in ipv4.
    13·1 answer
  • Parallel tangent and coincident are examples of what
    13·1 answer
  • An unauthorized user is a network _______ issue.
    11·1 answer
  • count multiples(num1, num2, AND) Description: Returns the number of multiples of N that exist between num1 and num2 inclusive. P
    12·1 answer
  • If your computer has a ________, someone else can gain access to it undetected.
    10·1 answer
  • The part of a rocket engine that allows the combustion gases and flames to leave the rocket engine is the
    14·1 answer
  • Select the parts of a business letter.
    6·2 answers
  • Can someone plz explain me what this button does and I’m scared to click it
    11·1 answer
  • I need help with excel
    7·1 answer
  • Why do we need to use a VPN service?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!