1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aalyn [17]
3 years ago
5

To use an ArrayList in your program, you must import:1. the java.collections package

Computers and Technology
1 answer:
Rom4ik [11]3 years ago
5 0

Answer:

Option 4: the java.util package

Explanation:

ArrayList is one of the Java collections that offer some handy features to manipulate a list of elements.  ArrayList is not available in a Java program by default without explicitly import it. To use ArrayList, we need to write an import statement as follows:

import java.util.ArrayList;

After that, we can only proceed to declare an ArrayList in our Java program. For example:

ArrayList<String> studentNames = new ArrayList<String>();

You might be interested in
Process is useful for a quick turnaround in game development?
aleksley [76]
Rapid prototyping as it allows the production of a functional program in a short time
7 0
3 years ago
Read 2 more answers
Suppose two computers (A &amp; B) are directly connected through Ethernet cable. A is sending data to B, Sketch the waveform pro
ICE Princess25 [194]

Answer:

Physical / Data link layer

Explanation:

If two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, the data would be transmitted if the network is clear but if the network is not clear, the transmission would wait until the network is clear.

The Open Systems Interconnection model (OSI model) has seven layers each with its own function.

The physical layer is the first layer responsible for data transmission over a physical link. The data packets are converted to signals over a transmission media like ethernet cable.

The data link layer is the second layer in the OSI layer responsible for transmission of data packets between nodes in a network. It also provides a way of detecting errors and correcting this errors produced as a result of data transmission.

4 0
4 years ago
Two technicians are discussing MAP sensors. Technician A says that the MAP sensor should be replaced if anything comes out of th
anygoal [31]

Answer:

Both are correct.

Explanation:

Both technicians are correct in this scenario. Technician A point of view is correct as well as technician B.

3 0
3 years ago
What data does Google Analytics prohibit collecting? Purchase amount Billing city Personally identifable information Product SKU
MA_775_DIABLO [31]

Answer:

Personally Identifiable Information (PII)

Explanation:

PII refers to any data which can help in identification of a person. This data can include name, email, address, credit card or debit card information.

Google Analytics, as the name suggests performs analysis of data present online. It is a web analytics service by Google. Web analytics refers to analysis of data present on the internet. This can be on social networking sites and search engines results.

This service is a tool to measure the return on investment (ROI) on advertisements done online. Online advertising includes advertising on social media and networking websites.

1. This can be used by businesses to measure customer satisfaction through analyzing their online reviews.

2. Also, customers visiting and responding to online advertising can be measured through this service.

3. The traffic that generates as a result of online promotions can be measured through Google analytics.

Web analytics is purely an analytical tool. This measures ROI through collecting customers data. This data can come from online purchasing, customer queries or consumer complaints.

1. The data to be analysed is filtered so that data that is fed into Google analytics does not fall under the category of PII. Any data that can reveal information about the identity of a person is classified as personal identifiable information.

2. The data filters out any PII and the remaining data is directed towards the Google analytics.

3. The data can include billing amount, product information and even billing city. Any of these data does not disclose the identity of a person.

Interpretation of results

1. The analytical results give the success or failure rate of online promotions.

2. The results also give insights into the customers mind. Consumer reviews and complaints give an insight into the success or failure of the company’s product.

Any of the above does not requires personal data from the customers hence, PII is not allowed to be collected by Google Analytics.

3 0
3 years ago
One vulnerability that makes computers susceptible to walmare is:
sammy [17]
C hope it’s right :))) !
6 0
3 years ago
Read 2 more answers
Other questions:
  • In your own words, describe the structure and function of both the stack and queue data structure and discuss how they are diffe
    6·1 answer
  • What is an icon or animation used to represent aparticipant in an internet chat referred to as?
    7·1 answer
  • What is the difference between HTML and CSS? * 1. CSS is a markup language unlike HTML. 2. HTML is a backend technology and CSS
    12·2 answers
  • Beth’s multimedia business specializes in sound integration and editing. A New project requires video editing and the creation o
    7·1 answer
  • One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with ex
    14·1 answer
  • Tennis players are not allowed to swear when they are playing in Wimbledon
    6·2 answers
  • Who do we make games for?(single term)
    15·2 answers
  • Give reasons why you care for your sense organs​
    10·2 answers
  • What is software engineering? What are the objectives of software engineering?
    5·1 answer
  • Hat is the limit of virtual machines that can be connected to a virtual network?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!