1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
3 years ago
7

Increment the intLocal, intStatic and intClass variables using the intone constant

Computers and Technology
1 answer:
n200080 [17]3 years ago
3 0

Answer:

In VB.net the keyword Static is not meant the same as in C#. In VB.net the static variable is termed as the shared variable and has the scope throughout the class. And this intStatic and intclass means the same. And for intClass we use the shared keyword, as shown in the image attached.

Explanation:

Here num2 is a local variable, and num2 is a shared variable. a is constant and used for incrementing. The rest is explained in the image.

You might be interested in
Can an apple watch break or have a camera?
Viktor [21]

Answer:

apple watches can break, and they can deffinetly have cameras if they engineered right.

Explanation:

5 0
2 years ago
Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario,
sladkih [1.3K]

Answer: d) Illegal and unethical

Explanation:  Illegal term is used for the something that is incorrect according to regulation.The legal factor is not present in this type of activity and thus it is judged by the regulations as unauthorized act and can be concluded as act of crime .

Unethical term defines that something is incorrect in a moral way and the person doing the unethical activity lacks the principles in his/her nature.

Jared is also performing illegal act by selling the piracy  antivirus package of software .The act is unethical as well because Jared is lacking the basic morals e.g.-stealing is offensive and incorrect act.Thus the correct option is option(d).

Other options are incorrect because the  act done by Jared is against the conduct which is not legal and ethics are moral features which is not present in Jared's act.

5 0
3 years ago
If there are three classes, Shape, Circle and Square, what is the most likely relationship among them?
xz_007 [3.2K]

Answer: B) Shape is a base class, and circle and square are derived classes of Shape.

Explanation:

Shape is a base class because circle and squares are the shapes so these are the derived class of the shape, which is inherited by the shape like circle and square. As, the base class (shape) is the class which are derived from the other classes like circle and square and it facilitates other class which can simplified the code re-usability that is inherited from the base class. Base class is also known as parent class and the super class.  

8 0
4 years ago
You need to have a password with 5 letters followed by 4 even digits between 0 and 9, inclusive. if the characters and digits ca
aleksandr82 [10.1K]
We all know that there are 26 letters available in the alphabet and there are just 5 even numbers between 0 and 9. We are now given the situation of how many passwords can we make out of the criteria of having 5 letters that cannot be repeated and 4 even digits from 0-9. We cannot repeat the numbers and letters, thus our password will look something like this, LLLLLNNNN, where L is a letter and N is a number. Let us note that  we cannot use the characters and digits more than once.This is how we will solve the probable number of passwords.

26 x 25 x 24 x 23 x 22 x 5 x 4 x 3 x 2

When we compute this formula, we will have the total number of possible passwords:

947,232,000.00

There are 947,232,000 possible passwords based on the given criteria.
8 0
3 years ago
To have the most impact when using email you should structure your message so that
VladimirAG [237]
It catches the readers attention making them respond to you quicker 
7 0
3 years ago
Other questions:
  • Your computer is slowing down because you’ve started a process that is taking most of the memory and CPU resources. Which of the
    7·1 answer
  • What happens when you send a fax to a phone?
    9·1 answer
  • What are three special purpose devices you might find in a data center and what do they do?
    10·1 answer
  • What data does Bittorrenting uses? Explain.
    5·1 answer
  • What is an example of the most important role of a systems analyst in any corporation?
    10·1 answer
  • Which of the following involves making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those
    5·1 answer
  • In theory, a(n) _____ can be an independent centralized database management system with proper interfaces to support remote acce
    15·1 answer
  • Suppose that you have a multiplexer (mux) with 5 different inputs at the following bit-rates: (A) 20 Kbps, (B) 8 Kbps, (C) 12 Kb
    7·1 answer
  • What is ‘Software Quality Assurance’?
    10·1 answer
  • What are a few ways to format the text in a mail message in Outlook? Check all that apply.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!