1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepan [7]
3 years ago
14

Write the definitions for three functions named max. Each receives two parameters, of the same type, and returns the larger of t

he two values. Define one of these functions to apply to type double, another to type int and a third to type char.
Computers and Technology
1 answer:
AnnZ [28]3 years ago
5 0

Answer:

public double max(double m, double n)

{

if (m>=n)

return m;

else

return n;

}

public int max(int m, int n)

{

if (m>=n)

return m;

else

return n;

}

public char max(char m, char n)

{

if (m>=n)

return m;

else

return n;

}

Explanation:

In each of the three methods declarations (Java) above, we are comparing two variables. m and n. The question did not specify what should happen when both variables are the same (i.e. m = =n). We make an assumption and set the condition to be if(m>=n) m should be returned as the greater.

You might be interested in
Which of the following is a productivity strategy for collaboration?
AfilCa [17]

Answer:

Where are the answer choices? Can you put them down so I can answer them?

Explanation:

8 0
2 years ago
what option can be used to create vpn connections that can be distributed to users' computers so that vpn clients do not have to
IRINA_888 [86]

This option can be used to create virtual private network (VPN) connections that can be distributed to users' computers so that VPN clients do not need to be configured on each client station is a VPN connection profile.

Users can send and receive data over shared or public networks as if their computer equipment were physically connected to a private network using a virtual private network (VPN), which extends the private network over the public network.

Increased functionality, security, and private network administration are all benefits of a VPN. It is often used by remote workers and allows access to resources that are not available on the public network. Although not an essential part of a VPN connection, encryption is often used.

By using dedicated circuits or tunneling protocols over existing networks, a VPN can be created by creating a virtual point-to-point connection.

To know more about VPN click here:

brainly.com/question/28945467

#SPJ4

6 0
1 year ago
A teacher takes the following steps when beginning to apply conditional formatting to a spreadsheet. Format Conditional Formatti
GrogVix [38]

Answer:

Click “between” under the equal menu, and then enter 90 in the first field and 100 in the second field

Explanation:

Since the user wants to highlight fields which contains value which are greater than 90 and less than 100, the operation seems to work well with “between” operator or between function. Since there is a start range and the end range it is better to deal with between function.

The other choices will not work because the greater than or less than operator works only on single value. Only the “between operations” works well on range of values.  All the other options are invalid.

8 0
3 years ago
If you interview a dentist to learn about her experiences on the job, she is considered a secondary source of information. Pleas
Alik [6]

A source can be either primary or secondary. The statement that if you interview a dentist to learn about her experiences on the job, she is considered a secondary source of information is false. A primary source provides direct or firsthand  experience, while a secondary source of information describes or analyzes the primary source. In this case, when the dentist is interviewed she is considered as primary source because she is speaking about herself and her experience.


6 0
3 years ago
Read 2 more answers
You are driving on expressway with three lanes in your direction at a speed lower then
Kaylis [27]

<em>ANSWER:</em>

<em></em>

<h2>Pass on the left<em> </em></h2>

6 0
3 years ago
Read 2 more answers
Other questions:
  • The section called Breaking Substitution Ciphers (p. 166) describes a "random substitution cipher," in which each letter of the
    11·1 answer
  • Individuals with desirable traits will be __________ to have young that survive than individuals without these traits. (2 points
    5·2 answers
  • Which of the following tends to be true of silent film acting as opposed to sound film acting?
    7·1 answer
  • A computerized spreadsheet program is useful for
    6·2 answers
  • why is the disk method a special case of the general slicing​ method? choose the correct answer below. a. the cross sections of
    7·1 answer
  • Can change the tab colors of the worksheets in excel
    13·1 answer
  • The used of PPE in the shop includes the following, except:
    10·2 answers
  • Display the total number of parking tickets.
    5·1 answer
  • ________(fill in the blank)in online education is intrinsically related to equity.
    13·1 answer
  • I'm not sure how to solve this problem
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!