1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darina [25.2K]
3 years ago
13

Assume that the following code exists inside a method of the class MyClass, and that this code compiles without errors: int resu

lt = book.getYearPublished(); where book is an object of the Book class. Which of the following is not true about the getYearPublished method? It is a mutator method. It is a public method in the Book class. It returns a String.
Computers and Technology
2 answers:
german3 years ago
6 0

Answer: The getYearPublished method is not a mutator method nor does it return a string.

DanielleElmas [232]3 years ago
4 0

Answer:

"it returns a string"  is not true about the method.

Explanation:

Since int result = book.getYearPublished() compiles without errors inside a method of the MyClass, "int result " part of the code states that the method returns an integer, not a string. getYearPublished is a mutator method and a public method in the Book class.

You might be interested in
Which of the following configuration files would you document
Nikolay [14]

Answer: B.you have modified a configuration file to mount these new file system automatically

Explanation:

Hope this helped...~DASH

4 0
3 years ago
What is the difference between a queue and a stack?
Zinaida [17]

Answer:

Difference between Queue and Stack are as following:-

  1. Queue is a FIFO(First In First Out) type data structure while Stack is a LIFO(Last In First Out) type data structure.
  2. The insertion and deletion of elements from the queue happens from two ends insertion at the tail and deletion from the front.While the insertion and deletion from stack happens from one end only that is top.
  3. The insertion and deletion operation in queue are referred as enqueue and dequeue. While in stack they are referred as push and pop respectively.
7 0
4 years ago
True / False
blagie [28]

Answer: True

Explanation:

Variable length instructions generally implemented by CISC processors use memory more efficiently than fixed length instruction of RISC processors sets because CISC supports array whereas RISC does not. Also CISC uses more complex addressing modes which consumes less memory cycles and the the program is also reduces. In Fixed length instruction in RISC processor the simple instructions has to be used a number of time which leads to more memory cycles.

7 0
4 years ago
Data management technology consists of the: Group of answer choices physical hardware and media used by an organization for stor
Illusion [34]

Answer:

software governing the organization of data on physical storage media.

Explanation:

Data management platform can be regarded as a foundational system utilized in collection and analyzing of large volumes of data across an organization. Data management encompass some variety of interrelated functions, the basic technology that is been utilized in

deployment and administering databases is regarded as database management system. Database technologies collect, store and also organize information then process it o that a user can easily finds needed details when they need it . It should be noted that Data management technology consists of the software governing the organization of data on physical storage media.

7 0
3 years ago
Speed and security are advantages generally associated with this type of network. wired wireless
Gennadij [26K]

Answer:

The answer to the given question is "Wired".

Explanation:

In this question, the answer is wired because A wired means cables that are used to connect system like a laptop or a desktop to the Internet or another network.

  • wired network uses cables that's why the speed and security of the wired network are high.
  • In wireless It allows devices to stay connected to the network and It is less secure to the wired.

That's why the answer is "Wired".

4 0
3 years ago
Other questions:
  • On the Internet, you can use a(n)______to look for information on any topic, such as books, movies, scholarly articles, news, an
    6·2 answers
  • You want to average the numbers in the range b1:b30. you have named this range of cells data and wish to use this range name in
    9·1 answer
  • What is the main role of LDAP?
    14·1 answer
  • Which statement does NOT describe working with text in presentation programs?
    13·2 answers
  • The formula =B2/A2 is inserted into cell C2. Which of the following is true when this formula is copied and pasted into cell C3?
    6·1 answer
  • Create two Lists, one is ArrayList and the other one is LinkedList and fill it using 10 state names (e.g., Texas). Sort the list
    6·1 answer
  • Which of the following is one of the tools in REPL.it that helps prevent syntax errors?
    10·1 answer
  • Como se juega robótica de cokitos
    13·1 answer
  • What is a graphics card?
    5·1 answer
  • As we’ve discussed, computer programs are considered creative works and are protected by copyright. That means those programs be
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!