1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
3 years ago
9

Another method that might be desired is one that updates the Student's number of credit hours. This method will receive a number

of credit hours and add these to the Student's current hours. Which of the following methods would accomplish this?a. public int updateHours( ){return hours;}b. public void updateHours( ){hours++;}c. public updateHours(int moreHours){hours += moreHours;}d. public void updateHours(int moreHours){hours += moreHours;}e. public int updateHours(int moreHours){return hours + moreHours;}
Computers and Technology
1 answer:
statuscvo [17]3 years ago
5 0

Answer:

Option d is the method

Explanation:

public void update Hours(int more Hours)

{

hours += more Hours;}e. public int update Hours(int more Hours){return hours + more Hours;

}

You might be interested in
Given the function definition void something ( int a, int& b ) { int c; c = a + 2; a = a* 3; b = c + a; } what is the output
timurjin [86]

Answer:

1 14 3

Explanation:

If that code fragment is put under a main() function and then it will yield the above output. According to the function something(), only changes in value second parameter will be reflected and first will be unchanged because second is passed by reference and the first one is passed as value so only address of 's' is passed, so, only its value is changed and the rest are same.

8 0
3 years ago
Sometimes data you export from Access needs to be formatted as a text file instead of an Excel file.
g100num [7]

Answer:

b. False

Explanation:

Microsoft access is a database management application that can store data that can be queried from every other microsoft applications like Word, Access, Onenote etc. its attachments can be converted to best best suit the application or client that needs the file or data.

Accesss database sheets are very to Excel worksheets or books. Tabular data, Graphs and most (if not all) data format can be linked, imported or queried between Access and Excel application. Formatting files (example csv files) to text are not necessary or encouraged when exporting files.

8 0
3 years ago
47. Which of these examples demonstrates good netiquette?
Masteriza [31]

Answer:

typing it, on a video detailing how boring and poorly made it is

Explanation:

this is an example of good netiquette because they are criticizing the video game and what good netiquette is is making a comment relevant to the original message. the original message being the video game

3 0
3 years ago
The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a
ValentinkaMS [17]

Answer:

b. The Safeguards Rule

Explanation:

According to a different source, these are the options that come with this question:

a. The Information Assurance Rule

b. The Safeguards Rule

c. The Safety Rule

d. The Guardian Rule

This rule is called the <em>Safeguards Rule</em>, and it comes from the Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999. This is an act of Congress signed by President Bill Clinton that removed barriers among banking companies, securities companies and insurance companies. This meant that organizations such as commercial banks, investment banks, securities firms, and insurance companies were able to consolidate.

7 0
3 years ago
Read 2 more answers
A new folder can be created by
user100 [1]

Answer:

The fastest way to create a new folder in Windows is with the CTRL+Shift+N shortcut. 1. Navigate to the location where you want to create the folder. You can create a new folder at any location on your hard drive or within another folder (creating a subfolder) in File Explorer.[/tex]

5 0
2 years ago
Read 2 more answers
Other questions:
  • What is the purpose of the product backlog refinement
    5·2 answers
  • What is an activity that can help you enhance the appearance of your computer’s desktop?
    12·2 answers
  • Which style of leadership would be most helpful to Charles in the following situation? Charles has just started an internship at
    15·1 answer
  • When working in Excel Online, what is it called when you drag the fill handle down to copy data?
    10·2 answers
  • Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she
    14·1 answer
  • Where must virtualization be enabled for VM (virtual machine) software to work?
    14·1 answer
  • I need to create a method named "root positive". which will either print the square root of the number passed to it or if the nu
    13·1 answer
  • Explain the integer and float datatypes with example.<br><br>​
    11·1 answer
  • When a computer is infected by a virus, _______.
    14·1 answer
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!