1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firdavs [7]
3 years ago
12

I have to write this in Java, but i've never even learned it before and i'm completely lost

Computers and Technology
1 answer:
Varvara68 [4.7K]3 years ago
7 0

Answer:

private void printArray(int[] arr){   //0

  System.out.print("[");   //1

  for(int k : arr){   //2

     System.out.print(k + ", ");   //3

  }

  System.out.println("]");   //4

}

Explanation:

This method should get you started. Your teacher may want a different format or a different type of loop. If you haven't learned for loops yet don't use them that'd be suspicious ;)

What I did:

0: This is the method heading with one parameter for the 1D array. If you need to access it in a different class change private to public.

1: This prints the [ with no line break

2: This is an enhanced for loop to iterate through each element in a 1D array. Alternatively, a normal for loop looks like this:

for (int i = 0; i < arr.length; i++)

instead of retrieving the variable with the enhanced for, you'd have to use arr[i] instead of k in this scenario.

3: This prints the value in each pass of the loop along with a comma and a space.

4: This adds the ] with a line break when the loop is completed

Hope this helps you get started :D comment if you need further help

You might be interested in
What is the difference between "call by value" and "call by reference"? Explain with example in c language.
Serjik [45]

Answer:

<u>Call by reference</u>

In an function if the variables are passed as reference variables this means that the variables are pointing to the original arguments.So the changes made in the function on the reference variables will be reflected back on the original arguments.

For example:-

#include<stdio.h>

void swap(&int f,&int s)

{

   int t=f;

   f=s;

  s =temp;  

}

int main()

{

int n,m;

n=45;

m=85;

swap(n,m);

printf("%d %d",m,n);

return 0;  

}

the values of m and n will get swapped.  

<u> Call by value</u>

In this program the values of m and n will not get swapped because they are passed by value.So duplicate copies of m and n will be created and manipulation will be done on them.

#include<stdio.h>

void swapv(int f,int s)

{

   int t=f;  

   f=s;  

   s=temp;

}

int main()

{  

int n,m;

n=45;

m=85;

swapv(n,m);

printf("%d %d",n,m);

return 0;

}

7 0
3 years ago
What is information richness?
mrs_skeptik [129]

d. Refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information.

<h3>Information richness</h3>

Information richness refers to the amount of sensory input available during communication. For example, <u>talking to co-workers in a monotone voice without varying pace or gestures is not a very enriching experience</u>. On the other hand, using gestures, tone of voice, and pace of speech to convey meaning beyond the words themselves promotes richer communication. Different channels have different information wealth.

Information-rich channels convey more non-verbal information. For example, a face-to-face conversation is richer than a phone call, but a phone call is richer than an email. Research shows that effective managers are more likely to use informative channels of communication than ineffective managers.

Learn more about Note-making Information: brainly.com/question/1299137

#SPJ4

4 0
2 years ago
To create a public key signature, you would use the ______ key.
olya-2409 [2.1K]

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

4 0
3 years ago
If you want to selectively darken an area of an image you could use the
DerKrebs [107]
Create an adjustment layer and create a hue and saturation layer. You'll see sliders so adjust them to your liking. next select a layer mask and fill it will black. then select which areas you want to darken and use the wand tool. Apply a gradient mask if you want. 
5 0
3 years ago
A commonly-used estimate for the number of bytes needed to store one
Basile [38]

Answer:

0.127 miles ; 5.458 *10^8 miles

Explanation:

Number of bytes needed to store a page = 2000

Number of pages (Harry Potter's book) = 800

Total memory required to store entire book = (2000 * 800) = 1600000 = 16 * 10^5 bytes

Hence,

1 byte of memory will store : (height of each book / memory size of each book)

= 3 ÷ 16 * 10^5

= 1.875 * 10^-6

For 32 bit memory space :

(1.875 * 10^-6 * 2^32) = 8053.06368 inches

1 inch = 1.578 * 10^-5 mile

8053.06368 inches = 8053.06368 * (1.578 * 10^-5) = 0.1270773448704 miles

= 0.127 miles

For 64 bit memory size :

(1.875 * 10^-6 * (2^64)) = 3.45876 * 10^13 inches

(3.45876 * 10^13) * (1.578 * 10^-5)

= 5.458 *10^8 miles

3 0
3 years ago
Other questions:
  • A (blank) is a way for students to keep track of information during research
    7·2 answers
  • In the MOV instruction both operands i.e. source andthe destination cannot be
    15·2 answers
  • Create a program to calculate the wage. Assume people are paid double time for hours over 60 a week. Therefore they get paid for
    10·1 answer
  • To share a document in my online electronic journal, I should select the option to _____.
    14·1 answer
  • PLEASE HELP FAST !!!!!!!!!!
    12·1 answer
  • Write a program that reads numbers from scanf (keyboard) and then sums them, stopping when 0 has been entered. Construct three v
    13·1 answer
  • What does an "embedded video" mean
    7·1 answer
  • How does a computer do its work? Mention its working principle.<br><br>​
    8·1 answer
  • Presentations must have what to be efffective
    8·1 answer
  • Which of the following tiny computer apps is designed to be useful but could cause more harm than good?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!