1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
STatiana [176]
3 years ago
15

In ________ for final fields and methods the value is assignedlater but in ______ you assign the value during declaration.

Computers and Technology
1 answer:
Oksi-84 [34.3K]3 years ago
7 0

Answer:

The answer to this question is Java,C++.

Explanation:

We can assign non static final variables a value with the declaration or in the constructor but this is not the case with c++ because we have to assign value during declaration and c++ equivalent of final is const keyword and there is sealed or readonly keywords in c# not final.If we do not assign value at the time of declaration the const variable will contain garbage value which cannot be changed afterwards.

You might be interested in
The tcp protocol provides error detection and correction. <br><br> a. True <br> b. False
ANEK [815]
B. False

Explanation

TCP provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between applications running on hosts communicating via an IP network.
4 0
1 year ago
(iii) If 1 GB = 2x<br>then what is the<br>value of x?​
frez [133]
Since a Gigabyte is made of Megabytes, 500 Megabytes times 2, 2(500MB), is equal to one Gigabyte. (1000MB)
UNLESS, it wants the Windows way of storage, because one Gigabyte in Windows terms is actually 1024 megabytes... then it’d be 2(512MB) because 512MB and 512MB equals one windows storage gigabyte.
4 0
3 years ago
For each scenario, select the best solution to try from the drop-down menu. A computer will not connect to the network. An IP ad
Inessa05 [86]

Answer:

1) Check the switches, routers, and hubs.

2) Try logging off and on again.

3) Make sure everything is plugged in and turned on.

4) Restore files from backup versions.

Explanation:

Hope this helped!! :D

6 0
3 years ago
What is the output of code corresponding to the following program segment if ?
wolverine [178]

Answer:

a. You are eligible to vote.

Explanation:

If Age >= 18 Then

Write "You are eligible to vote."

Else

Set - Age

Write "You can vote in " + Years + " years."

End If

The above code block is an example of if-else code block. The if-else code block follow a pattern of:

If (expression) then

else

(expression)

end if

Based on the if Age>= 18 condition, the output will be "You are eligible to vote."

4 0
3 years ago
Select the correct answer.
Vsevolod [243]

Answer:

A.  inspection

Explanation:

To find - Monica, a reviewer, wants to use a formal review for the SQA process. Which review should Monica use for this purpose?

A.  inspection

B . internal audit

C.  test review

D . walkthrough

Proof -

SQA process - Software Quality Assurance process

The correct option is - A.  inspection

Reason -

Formal review in software testing is a review that characterized by documented procedures and requirements. Inspection is the most documented and formal review technique.

The formality of the process is related to factors such as the maturity of the software development process, any legal or regulatory requirements, or the need for an audit trail.

The formal review follows the formal process which consists of six main phases – Planning phase, Kick-off phase, the preparation phase, review meeting phase, rework phase, and follow-up phase.

3 0
3 years ago
Other questions:
  • Why was the term personal computer created?
    5·1 answer
  • Which option best describes the game Farmville? It is designed to educate players about virtual currencies. It is designed to ed
    6·2 answers
  • Carl wants to add a new slide to his PowerPoint presentation. Which option should he use?
    6·2 answers
  • Beside homework, what products can you use for personal use? Identify three uses and briefly describe.
    13·2 answers
  • Explain each kind of pointer and for what it is appropriate
    15·2 answers
  • What is computer?explain any five characteristic in short.​
    9·2 answers
  • How is a transaction verified on a cryptocurrency network?.
    14·1 answer
  • How do you modify WordArt? Give specific details and steps<br><br> NEED THIS ASAP
    9·1 answer
  • Pleaseeeee helpppppppp​
    7·1 answer
  • In the bremmer article, the author states that _________ translates into greater risks.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!