1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prohojiy [21]
3 years ago
10

JAVA QUESTION::

Computers and Technology
1 answer:
allochka39001 [22]3 years ago
8 0

Answer:

3) 44 10 44

Explanation:

Given data

int [] val = { 3, 10, 44 };

The total number of parameters of given array are 3, so total length of array is also 3.

The indexing of array starts with '0', Therefore the <u>indexes</u> of array with length zero are: {0,1,2}

The value of array at index 0 is = 3

similarly

value at index 1 = 10

value at index 2 = 44

Any value of index 'i' of an array is selected using array[i].

Therefore,

val[0] is selecting the value of array located at index '0'.

val[0] = 3

val[2] is selecting the value of array located at index '2'.

val[2] = 44

Finally,

val[0] = val[2]; is copying the value placed at index 2 (44) to value placed at index 0 (3). Hence, the output would be { 44 10 44}. So 3rd option is correct.

 

You might be interested in
The ________ multiple-selection PHP statement is used to handle decision making and can be used to replace multiple if and if...
Sedaia [141]

Answer:

Option (4) is the correct answer of this question.

Explanation:

The switch is used to handle the multiple selections in the program when we need to choose on the condition and we have more then one condition arises then we have used the switch statement in the PHP.

Syntax of using Switch:-

switch(variable)  

{

case 1. statement

Break;

..................

default :

case n:

statement n

}

Other options do not use multiple selections so they are incorrect options.

7 0
3 years ago
Your company has recently been hired to install a smart security system for a large office building. The system will include sec
amid [387]

Answer:

Z-Wave

Explanation:

1. Wi-fi because it is always encrypted. This is good because Bandwidth is high—up to 2 MHz, however it only works if the signal is strong and device is close to the access point. Its average range is between 30 to 100 meters. This drawback only makes this technology not a good option.

2. ZigBee because it is always encrypted, ZigBee has lot of edge like largest number of device to connect 6500 theoretically, low power usage, faster and others compared to other which would have made it a better option to recommend to my company but it has interoperability issues

3. Z-Wave because it is the fastest wireless standard apart from this Z-wave has better interoperability, reliability, low frequent which does not interfere with Wi-Fi network, maintain backwards compatibility across all versions which is good for maintenance, Z Wave network to have greater ranges and ability to “bend” around obstacles.

4. Bluetooth because it is easiest to configure Low Energy (LE) is better at conserving power, it has a much longer range compared to others —up to 300 feet, under ideal circumstances—its low transmission rate will keep it from being used for data-heavy applications such as video.

In view of security and distance and compared with other IoT protocol i would recommended Z-Wave

8 0
4 years ago
What is the binary number 0011 0011 multiplied by two?
Nimfa-mama [501]

Answer:

1100110

Explanation:

0011 0011 = 51

51 x 2 = 102

5 0
3 years ago
Technologies that function within the established system are called
vesna_86 [32]
<span>Authorizing technologies are technologies that controls the use of system and network resources through authentication and authorization. 
</span><span>Enabling technologies are innovation technologies that drive radical change in the capabilities of a user or culture.
</span>Obstructing technologies include blocking<span> and filtering, content manipulation, attacks.
</span>Preemption means "prior seizure of" and preemptive technologies <span>take control of the operating system from one task and giving </span>it<span> to another task.
</span><span>Technologies that function within the established system are called enabling technologies.</span>
8 0
3 years ago
One of the greatest benefits of dual enrollment courses is that students can receive:
Vika [28.1K]
I think the answer to this is A
7 0
3 years ago
Read 2 more answers
Other questions:
  • What is are example of an engineered item?
    12·1 answer
  • What task did the u.s. government undertake that many people identify as the birth of the internet
    5·2 answers
  • The biggest factor in determining the price of a mortgage is:
    14·1 answer
  • To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
    5·1 answer
  • Does anyone have game design in connections
    13·1 answer
  • Plzz help.... <br><br>i will mark u as brainliest if u answer correct
    10·1 answer
  • if anyone is on a Chromebook, do you ever mean to press backspace, then you accidentally press the power button and think "OH CR
    13·2 answers
  • A python program for the following output using for loop.
    13·1 answer
  • Open excel program then use the (IF) function to fill the column of (Expensive/Cheap) then save your
    9·1 answer
  • Which type of measurement would you use to determine the mass of sugar?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!