1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Agata [3.3K]
3 years ago
10

Which of the following statements is false?

Computers and Technology
1 answer:
Sedbober [7]3 years ago
7 0

Answer:

The correct option to the following question is A.).

Explanation:

The following statement is false because,

  • We cannot use as the type-name throughout the function's body.
  • That's why the Wildcard type argument is referred to as the unknown types arguments and it acts as the placeholders for a real argument that are pass during the calling of the function.
  • A wildcard arguments are denoted by the Question mark(?).

You might be interested in
Why, during the final stage of the multistage model for e-commerce, is comprehensive customer information captured in the suppli
gulaghasi [49]

The reason why, in the final stage of the model for e-commerce, to captured in the supplier's database is  because it hasten customer service after an order had been delivery.

<h3>What is e-commerce?</h3>

The word electronic commerce  is often known as e-commerce. It is a term that connote a type of business model that gives room for firms and people to buy and sell goods and services using the Internet.

Note that the reason why during the final stage of the multistage model for e-commerce, a comprehensive customer information captured in the supplier's database is important because it boast or make faster customer service when an order have been delivery.

Learn more about  e-commerce from

brainly.com/question/23369154

5 0
2 years ago
Of the following common metals which has the highest conductivity rating?
never [62]

Answer: D. Silver (happy to help)

Explanation:

3 0
3 years ago
Read 2 more answers
You wrote a program to allow to guess a number chosen randomly.
Furkat [3]

Answer:

I think its A

Explanation:

5 0
3 years ago
Read 2 more answers
there is a structure called employee that holds information like employee code, name, date of joining. Write a program to create
Sever21 [200]

Answer:

The program in C is as follows:

#include<stdio.h>

#include<conio.h>

struct employee{

char empname[50]; int empcode, day,mon,yr;

}employees[30];

int main(){

int total;

printf("Numbers of Employees : "); scanf("%d",&total);

for(int kt=0;kt<total;kt++){

printf("Employee Code : "); scanf("%d",&employees[kt].empcode);

printf("Name: "); scanf("%s",employees[kt].empname);

printf("Date of Joining [dd mm yyyy]: "); scanf("%d%d%d",&employees[kt].day,&employees[kt].mon,&employees[kt].yr); }

int year;

printf("\nCurrent Date [Year only]: "); scanf("%d", &year);

printf("Code\t\t\t Name\t\t\t Date of Joining\n");

for(int kt=0;kt<total;kt++)

if((year - employees[kt].yr) >= 15)

printf("%d\t\t\t %s\t\t\t %d/%d/%d\n",employees[kt].empcode,employees[kt].empname, employees[kt].day,employees[kt].mon,employees[kt].yr);

}

Explanation:

See attachment for explanation where comments were used to explain some lines

Download txt
3 0
3 years ago
If you give someone ______ to your device, they can control it through another phone or computer.
icang [17]

If you give someone <u>Remote access </u>to your device, they can control it through another phone or computer.

<h3>What is  Remote entry?</h3>

An authorized user can use remote access to connect to a computer or network from a different location using a network connection. Users can connect to the systems they require through remote access even if they are physically far away.

Therefore, the dangers to remote access are:

  • There is a risk of device loss or theft due to a lack of physical security safeguards.
  • as the data is transmitted through a public internet, eavesdropping.
  • unapproved access to systems or data, possibly while oblivious to the screen.
  • If someone gets access to the gadget, they could watch and change the data.

Learn more about Remote access from

brainly.com/question/28900477
#SPJ1

5 0
2 years ago
Other questions:
  • A touch screen is classified as a special type of scanning device true or false
    15·1 answer
  • Which is the last step in conducting a URL search?
    6·1 answer
  • Ethics in businesses and organizations are made up of a set of moral principles that guide the organizations. Discuss how good w
    8·1 answer
  • What will the following segment of code output if 11 is entered at the keyboard?
    12·1 answer
  • Under what circumstances would a user bebetter off using a time-sharing system rather than a PC or asingle-user workstation?
    13·1 answer
  • Assume the following variable definition appears in a program:
    8·1 answer
  • The Internet has made going global easier than it has ever been, but the promise of "borderless commerce" remains restrained bec
    12·1 answer
  • Which control program flow options runs to the end of the code block and resumes the break mode at the statement that follows?
    12·1 answer
  • Write a C program to find the sum of 10 non-negative numbers entered by user​
    14·1 answer
  • It displays the contents of the active cell. It allows you to enter and edit data, such as formulas.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!