1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VLD [36.1K]
3 years ago
12

Write the code for invoking a method named sendsignal. there are no arguments for this method . assume that sendsignal is define

d in the same class that calls it.
Computers and Technology
1 answer:
Yuliya22 [10]3 years ago
6 0
Public class Example{

public static int sendSignal() {
     // code goes here
}
public static void main(String[] args) {
    int sendSignal = send();
}

You might be interested in
Find the largest and smallest byte,short,int,long,float, and double. Which of these data types requires the least amount of memo
gladu [14]
<h2>double, long, float, short, byte</h2>

Explanation:

The given data types are built-in types. According to java, the following holds right to justify the order.

Double:

  • This occupies 64 bits
  • It can hold decimal values
  • Example: "1.23456e300d, -1.23456e-300d, 1e1d"

Float:

  • It occupies 32 bits
  • Holds decimal values
  • Example: "1.23e100f, -1.23e-100f, .3f, 3.14F"

Long:

  • It occupies 64 bits
  • Example: "-2L, -1L, 0L, 1L, 2L"

Short:

  • It occupies 16 bits
  • Stores twos complement integer

Byte:

  • It occupies 8 bits
  • Stores twos complement integer
7 0
3 years ago
RDBMS stands for_________________
Aliun [14]
The term "RDBMS" stands for <span>relational database management system. 

I hope this helped! :)</span>
4 0
4 years ago
A penetration testing manager is contributing to an RFP for the purchase of a new platform. The manager has provided the followi
pochemuha

The manager has provided the following requirements <u>Password cracker: </u>

E. Password cracker

<u>Explanation:</u>

MITM is used to protect from hackers where they can hack the web site and misused the data. Basically man is in middle that monitors the network traffics between to tcpip and address and login as unauthorized person.

As RFP is a bidding process for purchase new product or new platform with complete document in details.

End user has to take care of hackers attack and make sure it is protected with all security holes.

Fuzzer is tool where send user data and check the security vulnerabilities and make sure it is protected.

It is not considered as high accuracy.

5 0
4 years ago
An organization has a website with a guest book feature, where visitors to the web site can input their names and comments about
kozerog [31]

Answer:

B

Explanation:

6 0
3 years ago
Read 2 more answers
What is the only language a microprocessor can process directly but most programmers almost never write programs in this code? Q
elixir [45]
A microprocessor can directly process machine code but most programmers almost never write in it.
C. Machine code
7 0
3 years ago
Read 2 more answers
Other questions:
  • Software design and implementation are interleaved activities. The level of detail in the design depends on the type of system b
    5·1 answer
  • Lydia noticed that she feels tired and out of breath after walking her dog up a hill in the park. Which area of fitness does she
    8·1 answer
  • What is a mortgage?
    8·2 answers
  • What port in your computer will you use to plug in your camera?
    14·2 answers
  • Whats the size of a short bond paper in microsoft word?
    10·1 answer
  • Which of the following is NOT considered a step in the problem solving process. A Try B Discover C Prepare D Define
    12·1 answer
  • analyze the ethical issues in the use of information technology in Multinational company (MNC) and support you answer with one e
    15·1 answer
  • Which of the following is true regarding the use of instance variable j in class B1?
    15·1 answer
  • Need answer ASAP. I’ll mark brainliest if correct
    7·1 answer
  • Question 1
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!