1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lera25 [3.4K]
3 years ago
9

Which of the following are valid calls to Math.max? 1. Math.max(1,4) 2. Math.max(2.3, 5) 3. Math.max(1, 3, 5, 7) 4. Math.max(-1.

5, -2.8f) A. 1, 2 and 4 B. 2, 3 and 4 C. 1, 2 and 3 D. 3 and 4
Computers and Technology
1 answer:
stiv31 [10]3 years ago
8 0

Answer:

1, 2 and 4

Explanation:

the Math.max() is the function in java which is used to compare the two values and it gives the maximum of two values.

it take only two argument and the data type can be int, float etc.

Math.max(1,4): it takes two int values and give the output 4. it is valid call.

Math.max(2.3, 5): it takes two values and give the output 5.0. it is valid call.

Math.max(1, 3, 5, 7): it takes 4 values which is wrong because function takes only two variables. it is not valid call.

Math.max(-1.5, -2.8f): it takes two values and give the output -1.5. it is valid call.

You might be interested in
The X.500 standard defines a protocol for a client application to access an X.500 directory known as which of the following opti
lions [1.4K]

Answer:

Option B is the correct answer for the above question.

Explanation:

DAP is a protocol technology that is used for the client and discovered by X.500 in 1988. Its use for the client host on the network. The operation of this protocol is --- Read, Bind, Search, List, Compare, Add and Modify the data.

The above question asked about the protocol which is searched by X.500 and used for the clients. So the answer is DAP which is stated by Option B hence this option is correct while other is not because--

  • Option 'A' states about DIB which is not a protocol. It is used by X.500.
  • Option C states about DIT which is not used by X.500.
  • Option D states about LDAP which can be used for client or server.

7 0
3 years ago
Hi what is ur favorite song my pop smoke
elixir [45]

Answer:

I have alot of favorite songs

Explanation:

3 0
3 years ago
Read 2 more answers
01000100 01101111 00100000 01111001 01101111 01110101 00100000 01101011 01101110 01101111 01110111 00100000 01111001 01101111 01
Anna71 [15]
This was quite tricky but, I found a program online that answers your question. The answer is (Do you know your binary code? Answer this in binary code)
5 0
3 years ago
Read 2 more answers
5: what privacy issues have arisen with webcams in mobile devices?
AnnZ [28]

What are the privacy issues that have arisen with webcams and mobile devices? People secretly record and broadcast other people without their permission.

3 0
3 years ago
You’re probably wearing on your wrist one of the world’s most common types of objects—a watch. Discuss how each of the following
Marrrta [24]

Answer:

a)Object :- A watch is comprised of various part which together join to give us a perspective on what the time at a given minute is. It is just when these parts are consolidated together that you can have what is known as a watch . The individual segments are normally structure and all things considered much of the time, this will start through building drawings or diagrams Depending on whether we will utilize a mechanical or an electronic watch, we should make diverse plan for the force source area, the watch packaging, the hands, the watch insurance. The primary concern the client ever look at from the watch is the situation of its hands to understand time. The remainder of the watch's working is typified inside its packaging and these mind boggling instruments are avoided the client of the watch.

b)Attributes:- Apart from having the option to understand time, a watch has characteristics, for example, its shading, its constituent material(for model, quartz, steel), its capacity source(mechanical, sunlight based, electronic) , additional properties, for example, water safe, its size, its capacity to monitor the date and month. Additionally , like its capacities, The watch's characteristics are speak to part of its structure in its designing graphs (for instance, a watch which works on sun oriented vitality will incorporate sun powered boards/cells) and as you will utilize a watch, its given qualities will be conveyed alongside it (the watch). Each watch will keep up its own characteristics . For instance, each watch monitors time as per how it was set up, however a given watch doesn't have the foggiest idea about the time in another watch with the exception of if these watches were synchronized to keep an indistinguishable record of time.

c)Behaviors:- Considering the way that conduct and technique are comparative terms. Consequently practices house the way(s) in which the watch plays out its assignments. For instance, for a mechanical watch the conduct/strategy shrouds the hand and wheel development systems from the client of the watch.  

d)Class:- A class is utilized to house/exemplify a lot of techniques that guide it(the class) in playing out the class' tasks.A class can be viewed as the outlines or on account of our watch , the building drawings/structure plan from which our watch object is made. It will consequently contain techniques empowering us to understand time, change time, etc.  

e)Inheritance:- With legacy, we can from a current class(parent class), make another class(child class). The new class assimilates the attributes of the current class and conceivably include extra and one of its very own kind qualities to these acquired qualities. Our morning timer may contain the general watch qualities, for example, the hands and the planning parameters and yet it might have an extra modified caution gadget which transmits extremely uproarious sounds and contains volume control. Simultaneously, the morning timer may not contain the band which most wrist watches contain.  

f)Abstraction:- Abstraction is a component which empowers us to effectively conceptualize a genuine article by expelling abundance/pointless subtleties of the item. On the off chance that we take a wrist watch , a pendulum clock, a morning timer and a mechanical watch and evacuate a given arrangement of highlights from every one of these various classes of watches, we will come to get the general arrangement of highlights that characterize every single watch. You can get a significant useful clarification of reflection from this site page Object Oriented Programming Abstraction ,  

g)Modeling:- Modeling has to do with making a portrayal of something , ordinarily for a littler scope. Concerning this definition, concocting the building drawings for a watch ought to speak to displaying.  

h)Messages:- When you need to adjust a simple watch(I consider alignment to be a technique subsequently the demonstration of aligning my watch is a strategy call), turning the crown makes an impression on the moment hand of the watch to pivot and henceforth move from an offered moment to another, resulting developments of the moment hand additionally cause the hour hand to move and consequently, the time perusing of the watch changes. The message I sent , which was that I needed to change time was executed as a technique approach the adjustment strategy.  

i)Encapsulation:- I will take the case wherein I am attempting to align my watch from the time readings of another watch. The two watches are questions by adjusting one watch from the perusing of another, I am realizing some type of correspondence between the two watches. One might have the option to align one watch from another, yet that doesn't mean he will have the option to comprehend the execution subtleties of the watch.

Explanation:

4 0
3 years ago
Other questions:
  • Giving reasons for your answer based on the type of system being developed, suggest the most appropriate generic software proces
    9·1 answer
  • When troubleshooting your BranchCache configurations, what specific commands will allow you to verify that all your clients are
    13·1 answer
  • The following types of websites are
    10·1 answer
  • Grenstall Inc., a software development firm, has adopted a new job evaluation system in which managers are asked to objectively
    12·1 answer
  • What is information technology?
    9·1 answer
  • Which of the following statements is NOT
    15·1 answer
  • Your supervisor has asked you if it is possible to monitor servers for potential port scans via SNMP. What two OIDs can you prov
    13·1 answer
  • How do we benefit from this increased interconnectivity?
    6·1 answer
  • How to share excel file for multiple users office 365?.
    7·2 answers
  • Instant Search can NOT be used to search through archived messages.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!