1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio [31]
3 years ago
15

Which of the following statements contains an error?

Computers and Technology
1 answer:
ASHA 777 [7]3 years ago
5 0
I. is syntactically correct if genderString exists. if genderString, for example, is "Male", then char gender would be the character at index 0 (the first character), meaning 'M'.

II. is incorrect. It is using the comparison operator (==) instead of the assignment operator (=). It is also setting a boolean variable to a String value of 'F'. Boolean values cannot hold string values, and can only hold true & false. 

III. is correct if ageString only contains numbers (presumably, it does, as it's called ageString). Integer.parseInt is a function that converts String values to integer values if the string values only contain numerical characters.

The answer in this case should be B. II only.
You might be interested in
What study skill is being used when taking a large project and breaking it down into smaller manageable tasks?
Lostsunrise [7]
Not sure but I think it’s called prioritizing
6 0
3 years ago
Read 2 more answers
What kind of physical device is an evil twin access point? What does the evil twin do after initial association when the victim
Rufina [12.5K]

Answer:

A PC such as a notebook computer.The evil twin gets the encrypted frame from the affected host,A VPN  encrypts a  frame with its own VPN key.

Explanation:

The evil twin after initial association when the victim client will establish a secure wireless connection with the victim client. The connection uses a key client-EF for encryption such that when the host transmits an encrypted frame it is transmitted to the evil twin. A VPN is an encrypted virtual private network used to access networks that are not trusted. The client encrypts a frame with a VPN key (Key Client-Server) which it shares with the server. The frame is further encrypted by the key it shares with the evil twin (Victim Client-ET) The evil twin will then receive a double encrypted frame. However, it will only be able to decrypt the Victim Client-ET key but not the VPN key hence it will not be able to read the message sent through the frame.

7 0
4 years ago
A __________ is typically stored in a JAR file and contains one or more packages that you want to make available to other projec
dsp73

Answer:

<u>class -files and auxiliary resources</u>

Explanation:

JAR stands for Java Archive which allows one to make multiple file bundles into a single file which is archive file and these JAR files contains in them the the auxiliary resources and the class files.

The archive file allows us to be storage efficient by compressing our data and files.

These files also allows us to transform our software into extensions as well.

For the enforcement of consistency of version of the packages, these files can be sealed optionally.

6 0
3 years ago
What is the name for the individual sections of the ribbon in PowerPoint 20162
Julli [10]

Answer:

Tabs

Explanation:

The ribbon contains the tabs. The tabs contain the command groups which hold commands

IF THIS HELPS PLEASE MARK THIS ANSWER AS BRAINLIEST

6 0
4 years ago
What symbol do we use to assign a value to a variable or constant in algorithms?
jekas [21]

The symbol that we do use to assign a value to a variable or constant in algorithms is =.

<h3>What is used to assign a constant to a variable?</h3>

The const keyword is known to be one that tends to specifies a variable or object value that is known to be  constant.

In computing and computer programming, there are different kinds of variables as well as symbols that are used for different purposes.

Note that if you assign a variable, you need to use the = symbol and thus The symbol that we do use to assign a value to a variable or constant in algorithms is =.

Learn more about algorithms from

brainly.com/question/13800096

#SPJ1

3 0
1 year ago
Other questions:
  • What is the command to use the memory diagnostics tool?
    11·1 answer
  • Which command is not one of the available Change Case options?
    11·1 answer
  • 2.7 code practice question 1 edhesive
    13·2 answers
  • python Consider this data sequence: "3 11 5 5 5 2 4 6 6 7 3 -8". Any value that is the same as the immediately preceding value i
    7·1 answer
  • JAVA QUESTION::
    10·1 answer
  • 2 Manter o autocontrole nos ajuda a evitar muitos problemas na nossa vida pessoal e no ambiente profissional. Em se tratando de
    14·1 answer
  • A program that doesn’t work properly needs to be debugged. true or false
    8·1 answer
  • Which areas of a business would most benefit from using the Workday platform?
    7·1 answer
  • How do you access the <br><br>internet in your school and at home?​
    11·1 answer
  • C++
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!