1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
4 years ago
7

Write the line that declares a two-dimensional array of strings named chessboard. that is, how would i declare a two-dimension a

rray of strings that is called chessboard? you would declare a string array by
Computers and Technology
1 answer:
matrenka [14]4 years ago
3 0

Answer:

String chessboard[][]=new String[6][6];

Explanation:

This is the declaration of a string 2-D array in java.

String is the data type of the variable.

chessboard is the name of the variable.

6 is the size of the 2-D array.

new is the keyword for allocating  space to array.

You might be interested in
Write an interface, PointingDevice, containing: an abstract method, getXCoord that returns an int an abstract method, getYCoord
vaieri [72.5K]

Answer:

Following are the code in java language

abstract interface PointingDevice // interface  PointingDevice,

{

// abstract method getXCoord()

public abstract int getXCoord();

// abstract method getYCoord()

public abstract int getYCoord();    

// abstract method attentionRequired()

public abstract boolean attentionRequired();  

// abstract method setResolution( )

public abstract double setResolution(double a);  

}

Explanation:

In this code we have declared a abstract interface "PointingDevice" which contains the four abstract method getXCoord of type int , getYCoord() of type int , attentionRequired() of type boolean and setResolution() of type double .

These method have only declaration not definition any interface or class which inherit the inteface PointingDevice must define all these four method otherwise it also be abstract .

4 0
3 years ago
Rita wants to know the size of each image in a folder. Which view will help her find this information quickly?
vaieri [72.5K]
The correct answer would be details.

8 0
3 years ago
You learn that in a previous security breach at GearUp, a disgruntled employee destroyed the encryption key that had been used t
lukranit [14]

Answer:

The data can be safeguarded using key escrow procedure.

Explanation:

Key escrow basically means to store the cryptographic key in an "escrow" by a reputable trusted third party. The copy of the encryption key is kept with the third party. In case the cryptographic key gets lost or destroyed, then the key escrow service helps to access the encrypted data. It also manages the access control to the key in case the key gets lost. So this way in case of security breach at GearOn the key escrow service can be used to re-implement or access the key easily.

6 0
3 years ago
Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by usi
pantera1 [17]

Answer:

True

Explanation:

<em>IP Address</em>: It is used to uniquely identify each device over the network.

3 0
3 years ago
1.
Vlad1618 [11]
A. Since it tells about how people think she’s lesser because she’s a women.
7 0
3 years ago
Other questions:
  • Which description best describes how mass spectroscopy is useful in the field of forensic toxicology
    6·1 answer
  • What is the value of vals[4][1]? double[][] vals = {{1.1, 1.3, 1.5}, {3.1, 3.3, 3.5}, {5.1, 5.3, 5.5}, {7.1, 7.3, 7.5}};
    6·1 answer
  • D. The 7-bit ASCII code for the character '&amp;' is:
    7·1 answer
  • Which of the following statements will ivoke the function get_course and store the reutrn values correctly? A. get_course(course
    8·1 answer
  • You've run 200 ft of cable and lost 7dB. What is the loss rate of your cable per 100 ft?
    14·1 answer
  • Which of the following is not a valid C language<br>int​
    6·1 answer
  • Write a program to change background colour of your visual basic form with any 3 different events.​
    15·2 answers
  • Which items in the list below are viruses. Click in the box to select your answer(s).
    8·1 answer
  • The U.S. consumes lots of energy. Which fuel provides the most energy?
    15·2 answers
  • A common business practice is to include a worksheet named Documentation that contains a description of the workbook, the name o
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!