1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
3 years ago
9

What is wrong with my code...

Computers and Technology
1 answer:
stiv31 [10]3 years ago
3 0
I'm not sure of the problem that you had in the first place, but I can point out that in your "bigger" method, if a number is greater than one then it is bigger, however the else statement says that the number *can* also be equal[==] to the second argument, so for example bigger(1,1) it would check if 1 > 1 and return false, so it will return that b[the second 1] is bigger! Hope this helps :D
You might be interested in
Impacto que ha tenido en la sociedad la educacion virtual​
iVinArrow [24]

Answer:

ʜᴏʟᴀ ɪᴅɪᴏᴛᴀ

ᴄᴏᴍᴏ ᴇsᴛᴀs

ᴇsᴛᴜᴘɪᴅᴏ

7 0
3 years ago
How should I do it Please code for Java
andrew-mc [135]

Answer:

class Main {  

 public static void printPattern( int count, int... arr) {

     for (int i : arr) {

       for(int j=0; j<count; j++)

           System.out.printf("%d ", i);

       System.out.println();

     }

     System.out.println("------------------");

 }

 public static void main(String args[]) {

   printPattern(4, 1,2,4);

   printPattern(4, 2,3,4);

   printPattern(5, 5,4,3);

 }

}

Explanation:

Above is a compact implementation.

3 0
3 years ago
Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, alt
Sphinxa [80]

Answer:

Encapsulating Security Payload (ESP)

Explanation:

Encapsulating Security Payload is also known as ESP, it is a protocol that exists within IPSec, it helps in determining the authentication, integrity and how confidential network pack data / Payload in IPV4 and IPV6 networks are.

ESP supplies messages /Payload encipher, it also helps in authenticating Payload as well as where it originated from in the IPSec protocol suite.

6 0
3 years ago
Which solution eliminates the need for dedicated high-speed WAN connections between sites
s344n2d4d5 [400]

Answer:

running in the 90 s intensifies

Explanation:

4 0
3 years ago
Universal Containers wants line items to be organized into pre-defined groups on the output document. The name of these pre-defi
devlian [24]

Answer:

Set the Group field on the Line Items type of Template Content record.

Set the New Quote Group field on each Product record with the associated group name.

Explanation:

The two array that can be implemented are:

  • Set the Group field on the Line Items type of Template Content record.
  • Set the New Quote Group field on each Product record with the associated group name.
5 0
3 years ago
Other questions:
  • The negotiators past relationship will affect current behavior if the parties
    12·1 answer
  • How did tafts accomplishments regarding conservation and trust-busting compare to roosevelt?
    11·1 answer
  • What is the difference between a rendering engine and a browser engine?
    5·2 answers
  • Although you can use a dialog box to indent paragraphs, word provides a quicker way through the ____.
    7·1 answer
  • How has music changed with the use of technology?
    14·1 answer
  • If I could make a Short Film on any topic it would be...how could that film change the world?
    9·1 answer
  • Who here has a crush on jk from bts but feels more mature than him
    10·2 answers
  • Match the ernerging technologies to their descriptions.
    14·1 answer
  • Is it possible build a real time machine?
    7·2 answers
  • Jazmine just finished setting up an operating system that's designed to work between a VM guest OS and computer hardware. What i
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!