1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
3 years ago
15

What keyword must be used on any method (function) on your class that is called from your main() method?

Computers and Technology
1 answer:
Y_Kistochka [10]3 years ago
8 0

Answer:

Idrk nglll

Explanation:

Sorry

You might be interested in
Is the IOT governable by frameworks? Explain your rationale.
polet [3.4K]

Answer:

Absolutely yes.

Explanation:

IoT is an acronym for Internet of Things. This is a system of network devices connected together in order to transmit data over the internet. And since communication of these devices is over the internet, there's a need for some protocols for control and moderation. Hence, the need for IoT governance frameworks.

Some of the aspects that should be governed by these frameworks are;

i. Data confidentiality:

Data such as Social Security Numbers, Bank Verification Numbers and Credit card details, that are being transmitted in an IoT system should be assured of protection from unwanted usage or access.

ii. Data integrity:

These data should also be assured of consistency and accuracy over a long period of time.

iii. Accountability:

When there is a breach or some sort of mishappening, there has to be a body that would be held accountable.

8 0
3 years ago
Two double quotation marks with no space in between is referred to as the ____ string.
Andrew [12]
Empty
................
7 0
3 years ago
​Eamon wants to provide a discount to premium buyers who order in large quantities. He wants to create a code for each price and
SCORPION-xisa [38]

Answer:

The correct answer for the following question will be A. Cipher code.

Explanation:

Cipher code:

Ciphers are potentially the cryptographic central pillar. A cipher is usually an algorithm to perform both encryption and decryption.

Secret key encryption relies on the use of symmetric ciphers. Whether the goal is to convert plaintext to ciphertext and vice-versa. The secret key is shared on both ends, and the person having the secret key can only encrypt and decrypt the data.

So, option A is a suitable answer.

3 0
3 years ago
The number of pixels displayed on the screen is known as
hodyreva [135]

Resolution is the correct option

Have a great day

5 0
3 years ago
You can partition any table except one that is part of a ____
Studentka2010 [4]
Cluster perhaps
is the answer

6 0
3 years ago
Other questions:
  • Which of the following commands would instruct OSPF to advertise ONLY the 192.168.10.0/24 network in Area 0?
    13·1 answer
  • Suppose that class OrderList has a private attribute double cost[100] which hold the cost of all ordered items, and a private at
    14·1 answer
  • (10 points) 5.12. Discuss how the following pairs of scheduling criteria conflict in certain settings. a. CPU utilization (effic
    9·1 answer
  • Each professional association has
    7·1 answer
  • To protect a computer, it is a good idea to install and frequently run
    6·2 answers
  • Chapter 8 discusses five principles for making a graphic clear and understandable. One principle is that the graphic should have
    11·1 answer
  • Descuss the five generations of Computer language
    7·1 answer
  • Match the parts of the software applications with what they do.
    15·1 answer
  • What is pseudo code?
    11·2 answers
  • What is a guardian node summary for theta staking tool
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!