1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Keith_Richards [23]
3 years ago
11

Look at the following function prototype. double mynewFunction(int); What is the data type of the function’s return variable?

Computers and Technology
1 answer:
nadezda [96]3 years ago
3 0
The answer is A) Double.

The return type is specified before the method's signature, and the signature is composed of the the method's name and parameters.

In this case, the method is named mynewFunction, takes in an integer as a parameter, and returns a double.

Also, fun fact which is kind of unrelated: if two or more methods have the same name, they can have different functionality as long as their signature is different (different parameter types).
You might be interested in
15 _____ 3 = 0 Question 11 options: a) / b) % c) * d) //
Vesnalui [34]
The option B is correct
5 0
3 years ago
how old is the letter 3 on its 23rd birthday when your car turns 53 and your dog needs gas and your feet need lave then when is
forsale [732]

Answer:

ummm...idr.k..u got me....wat is it

Explanation:

8 0
3 years ago
Convert infix to postfix
kvv77 [185]

Answer:

static int checkSymbol(char ch)

{

switch (ch)

{

case '+':

case '-':

return 1;

case '*':

case '/':

return 2;

case '^':

return 3;

}

return -1;

}

static String convertInfixToPostfix(String expression)

{

String calculation = new String("");

Stack<Character> operands = new Stack<>();

Stack<Character> operators = new Stack<>();

 

for (int i = 0; i<expression.length(); ++i)

{

char c = expression.charAt(i);

if (Character.isLetterOrDigit(c))

operands.push(c);

else if (c == '(')

operators.push(c);

 

else if (c == ')')

{

while (!operators.isEmpty() && operators.peek() != '(')

operands.push(operators.pop());

 

if (!operators.isEmpty() && operators.peek() != '(')

return NULL;    

else

operators.pop();

}

else

{

while (!operators.isEmpty() && checkSymbol(c) <= checkSymbol(operators.peek()))

operands.push(operators.pop());

operators.push(c);

}

}

while (!operators.isEmpty())

operands.push(operators.pop());

while (!operands.isEmpty())

calculation+=operands.pop();

calculation=calculation.reverse();

return calculation;

}

Explanation:

  • Create the checkSymbol function to see what symbol is being passed to the stack.
  • Create the convertInfixToPostfix function that keeps track of the operands and the operators stack.
  • Use conditional statements to check whether the character being passed is a letter, digit, symbol or a bracket.
  • While the operators is  not empty, keep pushing the character to the operators stack.
  • At last reverse and return the calculation which has all the results.
4 0
3 years ago
Social media platforms are the only types of social media on the Web. True False
PIT_PIT [208]

Answer: true

Explanation:

4 0
3 years ago
Read 2 more answers
You work for a company that hired a pen testing firm to test the network. For the test, you gave them details on operating syste
Bingel [31]

Answer:

White box testing strategy

Explanation:

Pen or penetration testing, also known as ethical hacking is a technique used by an organisation to examine the computer systems, networks and web applications for security vulnerabilities such as loopholes, that can be exploited by an attacker.

There several strategies in pen testing that can be used to check for network vulnerabilities, they are, internal testing, external testing, black box testing, white box testing, blind testing etc.

Unlike in black box testing, white box testing provides all necessary information like IP addresses, network structure, operating system etc, to the pen tester.

4 0
3 years ago
Other questions:
  • Which mitigation technique would prevent rogue servers from providing false ip configuration parameters to clients?
    5·2 answers
  • A few questions related to power point.
    8·1 answer
  • What is the absolute pathname of the YUM configuration file? REMEMBER: An absolute pathname begins with a forward slash
    12·1 answer
  • On five lane roadways, the center lane is designated for __________ and is used by vehicles traveling in both directions.
    14·1 answer
  • Write a C# program named InchesToCentimeters that declares a named constant that holds the number of centimeters in an inch: 2.5
    14·1 answer
  • ___ is the amount of data that a storage device can move from the storage medium to the computer per second.
    11·1 answer
  • What is the platform-neutral programming language that can run on Windows, Macintosh, or UNIX?
    15·1 answer
  • In Activity 6.4 we asked you to compare the experience of playing the game of Snake on a
    14·1 answer
  • Es el nombre que se le da a la<br> intersección de una columna y fila:
    15·1 answer
  • Write algorithm and flowchart for the following<br>a.find the sum and average of any four numbers ​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!