1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dlinn [17]
3 years ago
7

Write a method called listUpper() that takes in a list of strings, and returns a list of the same length containing the same str

ings but in all uppercase form. You can either modify the provided list or create a new one.
Computers and Technology
1 answer:
lord [1]3 years ago
6 0

Answer:

public static List<String> listUpper(List<String> list){

    List<String> upperList = new ArrayList<String>();

   

    for(String s:list){

        s = s.toUpperCase();        

        upperList.add(s);

    }

    return upperList;

}

Explanation:

Create a method named listUpper that takes list as a parameter

Inside the method, initialize a new list named upperList. Create a for-each loop that iterates through the list. Inside the loop, convert each string to uppercase, using toUpperCase method, and add it to the upperList.

When the loop is done, return the upperList

You might be interested in
You often need to have several applications open at the same time. Which requirement is related to this need?
Musya8 [376]

Answer:

processor speed is the answer but not sure

5 0
3 years ago
E-governance is the only solution against corruption. justify the statement in context of nepal​
notka56 [123]

Answer:

Following are the solution to this question:

Explanation:

The E-government implies use as part of the government systems to offer SMART, which is used to manage smart governance, ethics or accountability, sensitivity, and transparency. It is the research teams, that also shown that policies were progressing in India's creation of information technology. It is also argued against reducing the risk of bribery through improved public official surveillance and reducing its need for citizen engagement with porters with key services.

6 0
3 years ago
List of bad websites and why
r-ruslan [8.4K]

Penny Juice – bad design examples.

Blinkee website – bad design example.

Great Dreams I — bad designed website.
8 0
2 years ago
Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission fr
Tatiana [17]

Answer:

b) White-hat hacker

Explanation:

This is also called an ethical hacker. Unlike the other options, a white-hat hacker is a person specialized on computational security which offers services to organizations to test how safe they are from informatic attacks (viruses, theft of information, etc). This is carried out  based on a agreement between the whihte-hat hacker and the client via a contract.  

8 0
3 years ago
Which of the following is NOT a career in the Information Support and Services pathway?
frosja888 [35]

Answer:

here yuuuurrrrr Vote for me nah jk

6 0
2 years ago
Other questions:
  • Credibility means that the reader perceives value in what you write.<br> True False
    12·1 answer
  • Why computer process faster than humans?​
    10·2 answers
  • Briefly explain what are JavaScript librairies​
    12·1 answer
  • Please hurry Arrange the steps of the engineering design process in the correct sequence.
    10·1 answer
  • How could you insert a new row between rows 20 and 21?
    7·2 answers
  • . ------------ means that the two merging companiesbecame history and a new firm
    10·1 answer
  • Which of these is a way that a doctor can examine a patient?
    5·1 answer
  • Write a program that takes a list of integers as input. The input begins with an integer indicating the number of integers that
    8·1 answer
  • Computer simulations were first developed during __________<br> as a part of the _____________
    5·1 answer
  • What is Digital Citizen? It's one of my classes.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!