1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
14

You created a two-dimensional array with the following code.

Computers and Technology
2 answers:
Dennis_Churaev [7]3 years ago
6 0

Explanation:

I would say aList[1][2]

marin [14]3 years ago
4 0

Answer:

aList[1][2]

Explanation:

You might be interested in
music sites through schools wifi 2020 What is one thing a person should do to stay safe when exercising? 100 pts.!
SVEN [57.7K]

Answer:

They should stay away from others (keep workout short or at home)

always do The exercise right-properly

Explanation:

8 0
3 years ago
Read 2 more answers
The following are three possible logon scenarios. Explain why option (c) below is preferable in terms of system security. a. Wel
SashulF [63]

Answer:

because the password being used is of high quality

Explanation:

Option C is the most preferable in terms of system security because the password being used is of high quality. Meaning that it contains lower case and capital case letters as well as numbers. It is also a random mix of all three and is not a common word or name. The length of the password is normal but could be longer for better safety. These things make it very difficult and time-consuming for a software program to guess the password, and nearly impossible for an individual to guess.

4 0
3 years ago
Given main() and a base Book class, define a derived class called Encyclopedia. Within the derived Encyclopedia class, define a
NemiM [27]

Answer:    

Here is the Encyclopedia class:

public class Encyclopedia extends Book {   //class  Encyclopedia that inherits from class Book

  private String edition; //declare private member variable edition of type String  

  private int numVolumes;      //declare private member variable numVolumes of type int

  public void setEdition(String ed) {  //mutator method of class that sets the value of edition

     edition = ed;    }     //assigns the value of ed to edition member field

  public void setNumVolumes(int numVol) { //mutator method of class that sets the value of numVol

     numVolumes = numVol;    }  //assigns the value of numVolumes to edition member field

  public String getEdition() {  //accessor method to get the value of edition

     return edition;    }     //returns the current value of edition

  public int getNumVolumes() {  //accessor method to get the value of numVolumes

     return numVolumes;    }       //returns the current value of numVolumes

  public void printInfo() {  //method to print edition and number of volumes information on output screen

     super.printInfo();  // The super keyword refers to parent class Book objects. It is used to call Book method and to eliminate the confusion between Book class printInfo method and Encyclopedia printInfo  method

     System.out.println("   Edition: " + edition);  //prints edition info

     System.out.println("   Number of Volumes: " + numVolumes);    }  }  //prints number of volumes info

Explanation:

The explanation is provided in the attached document.

7 0
4 years ago
Evaluate the merits of a hard disk drive or a solid state drive to use as the secondary storage
gavmur [86]

Answer:

good morning I am a little bit of a very nice and smart ways of learning and smart ways

5 0
3 years ago
Detrmine whether the following pairs of lines are paralles , perpendialor or neither. 8x+9y=5 and 4x+2y=7 Y=2x-4 and y=4x-2 X=9
Vladimir [108]

Answer:

perpendicular for the first one

4 0
3 years ago
Other questions:
  • To what device, inside the computer, do all other devices connect
    10·2 answers
  • If the boolean expression a is true and b is false, the value of the logical expression a or b is ________.
    14·1 answer
  • After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?​
    6·1 answer
  • Which VPN protocol does not support using Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (C
    14·1 answer
  • When you buy an Xbox 360 can you play online for free
    12·2 answers
  • Michael is trying to remember his friend’s new cell phone number. He repeats it in his mind until he gets the new number entered
    8·2 answers
  • Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an
    8·1 answer
  • Write a couple of paragraphs about the usefulness of computer​
    5·1 answer
  • In which drawer can you set certain lights to light up on your micro:bit?
    12·2 answers
  • Create 2 methods of your choice.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!