1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetach [21]
3 years ago
6

Public static double secret(int first, double second)

Computers and Technology
1 answer:
gizmo_the_mogwai [7]3 years ago
6 0

Answer:

d. double temp;

Explanation:

Given

The above code segment

Required

Which is not part of the method definition

The method in the above program is:

public static double secret(int first, double second)

Looking through the options, we can conclude that:

d. double temp;

..... is not a part of the method

You might be interested in
Which of the following help departments organize unique access controls for access to folders and data files within a department
never [62]

Answer:

B. Role-based access controls

Explanation:

Roll-based access control is a way to control access to the network and to data which depends on the position of employees in a department. This way the permission to access information are granted according to roles that are assigned to employees. This type of access control allows access privileges to employees only to the folders and data files which they need in order to perform their tasks and it does not allow them to access the data or information which is not relevant to them. This helps the department to secure the sensitive information and data files and reduces the risk of data breaches.

6 0
3 years ago
A device combined with a switch, router, and wireless access point is called what?
ra1l [238]

It is called a wireless router!

8 0
3 years ago
Read 2 more answers
Will mark brainliest! What does this code do? What kind of code is this called?
gavmur [86]

Answer:

lol u can barly call this a code

Explanation:

its just a type error code i think

3 0
3 years ago
give an example of a technical issue you were not able to resolve on your first attempt. What troubleshooting steps did you take
erastovalidia [21]
One technical issue I had was on Windows 8.1, with the charm menu not working. The troubleshooting steps to fix it was I did CTRL+SHIFT+ESC to open task manager. I then found Windows Explorer and clicked "Reload." Then everything was fine.

Hope This Helped!
6 0
3 years ago
An ip address in the address range 169.254.x.y, used by a computer when it cannot successfully lease an ip address from a dhcp s
Georgia [21]
Yes that is the correct answer


5 0
4 years ago
Other questions:
  • A password checking system that disallows user passwords that are proper names or words that are normally included in a dictiona
    15·1 answer
  • Can embedded computers automate security so you can lock and unlock doors remotely
    15·1 answer
  • What invention changed the nature of communication and commerce in the first half of the nineteenth century?
    13·2 answers
  • Secops focuses on integrating the need for the development team to provide iterative and rapid improvement to system functionali
    14·1 answer
  • Please help me on this app how do you take a picture of your work
    14·1 answer
  • In implementing Secunity Lfe Cycle:_______
    8·1 answer
  • bro i got banned for posting an amazing bulk pic, but this dude literally posted an inappropriate, dafuq is wrong with this bann
    8·2 answers
  • Which attributes does not come in tag?
    12·2 answers
  • Ryan is developing a camera app for iOS with the following objectives: make it easier for users to choose and sort pictures; and
    8·1 answer
  • What does dr. sanford say about the comparison of the genome with a computer program?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!