1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marianna [84]
3 years ago
5

What is displayed on the console when running the following program?

Computers and Technology
1 answer:
Andre45 [30]3 years ago
6 0

Answer:

The answer is "Option A"

Explanation:

In the given java code, a class "Test" is defined, inside the main method try and catch block is used, inside the try block method "p()" is called, that print a message. in this block two catch block is used, that works on "NumberFormatException" and "RuntimeException".  In the method "p" declaration, a string variable "s" is defined, that holds double value, that is "5.6", and converts its value into the wrong integer, and other wrong option can be described as follows:

  • In option B, it is wrong, it is not followed by after call method.
  • In option C, It is not followed by runtime exception, that's why it is incorrect.
  • Option D and Option E both were wrong because they can't give run time and compile-time error.  
You might be interested in
During active listening, which response is NOT an example of providing feedback to the speaker to show that you understand his o
MaRussiya [10]

Answer:

The answer is D.

Explanation:

They/you are asking the speaker to clarify what they just said.

6 0
3 years ago
Your browser has blocked your from your crucial secure intranet sites. What could be the problem?.
Alenkinab [10]

A browser is a program that allows and provides the user access to information and web pages on the internet. It blocks someone when their SSL certificate status has been voided.

<h3>What is an SSL certificate?</h3>

An SSL (Secure Sockets Layer) certificate is a digital code and certificate present on the web that authenticates and provides security for communication. It is a security protocol that allows encrypted transmission.

The firewall supervisor sets the rule to block or allow the users to connect to Crucial Secure Intranet Sites based on their SSL certificates. SSL certificate if gets revoked then does not allow users to reach the site and declares it to be a potential risk.

Therefore, the browser is not reachable when the SSL certificate gets expired.

Learn more about SSL certificates here:

brainly.com/question/24276018

#SPJ1

3 0
2 years ago
What is a trojan horse in computer science?
Firdavs [7]

Answer:

type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

Explanation its malware

4 0
2 years ago
In 1981, Ian Murphy broke into the AT&amp;T online computer system and changed their clocks, allowing people to make calls durin
poizon [28]
A. intentionally or recklessly disrupt, degrade, or destroy information or services on the computer
5 0
2 years ago
Legal counsel has notified the information security manager of a legal matter that will require the preservation of electronic r
Ray Of Light [21]

Answer: (B) Legal hold

Explanation:

As being a security director, the security director are approached to solidify a server that run the red hat enterprise server the 5.5.

The servers are being utilized as DNS (Dynamic host service) and the server time. This is not utilized as the database, print server and the web server. There is no particular remote associations with the server.

The window of the command will be given the root accessing. Then, it provide the associated by means of a protected shell with the access root in the system.

 

3 0
3 years ago
Other questions:
  • Suppose we wish to put a set of names in alphabetical order. We call the act of doing so sorting. One algorithm that can accompl
    15·1 answer
  • Before responding to an e-mail from another student in an online course, a student should
    13·2 answers
  • Which measure should you take for the periodic maintenance of your computer?
    15·2 answers
  • Which website is important for hacking
    13·1 answer
  • What invention in the past do you think had a significant impact on our culture/ lifestyle? What do you think will be invented/
    11·1 answer
  • Hi there! I just started my beginner computer science class and I was wondering if anyone wants to help with an assignment i'm h
    15·1 answer
  • Gauthmath https://s.tutorus.xyz/lp/invite?code=GGQGBL​
    13·1 answer
  • Paul wants to store addresses and phone numbers for clients. Paul wants to use this information to send form letters. Paul shoul
    5·1 answer
  • How do big organizations take back their data to be reviewed after a disaster?
    6·1 answer
  • What would be printed to the screen when the following program is run?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!