1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leni [432]
3 years ago
11

Given a two-dimensional array named scores with double type elements, write the embedded loop to navigate this array and multipl

y each element in the array by 10, and put the embedded loop inside a method named increase , and the only parameter of this method is a double type two-dimensional array. This method increase should have void as its return type.
Required:
Write the one line of code to invoke the increase method inside main. Do you need to receive the return value of increase with a local variable, why or why not?
Computers and Technology
1 answer:
bearhunter [10]3 years ago
7 0

Answer:

Following are the code to this question:

void increase(double scores[][]) //defining method increase

{

//defining loop to multiply the value by 10

for(int x=0;x<scores.length;x++)

{

for(int y=0;y<scores[x].length;y++)

{

scores[x][y]=scores[x][y] * 10; //multiply value

}

}

}

increase (scores);  //call method and pass the value

Explanation:

Description to this question can be described as follows:

  • In the above-given code, a method increase is declared, in which we pass a double array "scores", and inside the method two for loop is defined.
  • Inside the loop an integer variable "x and y"  is used, which multiply by 10 in the score array.
  • In the next line method is called, that accepts array value, in this method calling we can't need to receive the return value because it increases, and it does require a void return type.
You might be interested in
Melissa is writing a class called Cell. Which method has she set up to return a double?
Alina [70]

Answer:

C. public double get_mCount()

5 0
3 years ago
In 3–5 sentences, describe the unique challenges e-mail presents for business communications.
alina1380 [7]
One of the things that are a challenge, is that you have to get the correct puntuation, correct capitilization, because it's a buisness email. You ont want to mess a buisness email up. You also have to have no repating phrases and sentences. You can't be adding random words and saying "and" all the time. 
7 0
3 years ago
Read 2 more answers
Briefly explain the cooling mechanism implemented in FANLESS Laptops
Akimi4 [234]

The primary function of a fan in a computer system is to cool down the internal components and prevent overheating. Fanless computers use alternative cooling methods and lower-powered components that give off less heat. As a result, these machines are quieter during operation, use less energy and are often more compact than fan-based computers. These advantages are particularly important in business settings.
8 0
3 years ago
Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di
steposvetlana [31]

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

5 0
3 years ago
Controlling inflation is the job of the __________________.
n200080 [17]
B. Federal Reserve................
8 0
3 years ago
Read 2 more answers
Other questions:
  • Select the best answer for the question. 19. While broadcasting a football game, the announcer exclaimed, "I can't believe it. C
    7·2 answers
  • What is the service provided by a third party (such as an ISP) that enables you to connect another cloud directly to your Google
    15·1 answer
  • What sugar is used in a DNA molecule​
    7·2 answers
  • What is an example of a transition effectl
    7·1 answer
  • Help pleaseeeeeeeeeeeee
    13·2 answers
  • Once you resize a photograph, it cannot be returned to its original size. TRUE or FALSE
    8·1 answer
  • Which osi/iso layer is responsible for determining the best route for data to be transferred?
    5·1 answer
  • What is the first thing you should do to find a mean and range of data?
    14·1 answer
  • Computer can do work very___​
    7·2 answers
  • How do you think electronic spreadsheets have transformed businesses today?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!