Answer:
import java.util.Arrays;
public class swap{
public static void main(String []args){
int [] arr = {2,4};
swapValues(arr);
}
public static void swapValues(int[] values){
int temp;
System.out.println(Arrays.toString(values));
temp=values[0];
values[0]=values[1];
values[1] =temp;
System.out.println(Arrays.toString(values));
}
}
Explanation:
In the program above, we created the method swapValues that receives an array of integers as parameters. in the method definition, we created a temp variable that is used to swapp the element at index 0 and index 1. Java's Arrays.to string method is used to print the array before and after the swap.
Answer:
The marketing functions involves various responsibilities of the business organization, these functions are responsible for the growth of company. The key roles and responsibilities of marketing functions are market research, finance, product development, communication, distribution, planning, promotion, selling etc.
Generally speaking, adware is a program that installs an additional component that feeds advertising to your computer, often by delivering pop-up ads or by installing a toolbar in your browser.
Some adware may hijack your browser start or search pages, redirecting you to sites other than intended. Unless you're a fan of guerrilla marketing, such tactics can be annoying. Worse, the mechanism that feeds the advertising can introduce system anomalies or incompatibilities that cause problems with other programs and can even disrupt the functioning of the operating system.
Spyware surreptitiously monitors your computer and internet use. Some of the worst examples of spyware include keyloggers who record keystrokes or screenshots, sending them to remote attackers who hope to glean user IDs, passwords, credit card numbers, and other sensitive information.
Most often, though, spyware takes a more benign but still quite offensive form. The information gathered, often referred to as "traffic data," can consist of monitoring the websites visited, ads clicked, and time spent on certain sites. But even in its more benign form, the collected data can morph into something far more insidious.
Hope this helped.. ;D
To provide the network number and node number of a machine. Not too useful without a network mask to separate them.