1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stolb23 [73]
2 years ago
14

A method signature for a method consists of all elements of the method except the body. That is, a method signature consists of

the privacy, (non-)static, return datatype, method name, and formal parameters. Consider the ceiling method as an example.
public static int ceiling (double num)
{
return num <= 0 ? (int) num: (int) num + 1;
}
The method signature of the ceiling method is the first line of the method: public static int ceiling (double num). In this example, we note that ceiling is static because it is a standalone method and does not require an object to invoke (since we are not acting on an instance of a class).
For parts a - d, give the method signature described by the scenario.
a) A method in class String that returns the reversed version of the current String.
b) A method that returns the maximum of two given integers.
c) A method that returns true or false if the input integer is an even number.
d) A default constructor for class Table.
Computers and Technology
1 answer:
Bess [88]2 years ago
8 0
To be honest I feel like it’s B that’s looks and seems the most correct to me
You might be interested in
How does the occupational outlook affect the monetary benefits of a career
Ksivusya [100]
If there are changes to the responsibilities in a career, the typical outcome will change.
4 0
3 years ago
Who was the first president
Firlakuza [10]
George Washington was the first president of the United States that is your answer
4 0
3 years ago
Read 2 more answers
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
An apple, potato, and onion all taste the same if you eat them with your nose plugged
lys-0071 [83]

Answer:Have a good dayyyyy

Explanation:    can i be brainliest pls pls

4 0
3 years ago
Read 2 more answers
which part of a computer takes the text and picture on your on your screen and prints them onto paper ​
inessss [21]

Answer:

Its the printer. The details shown on screen can be tested on monitor using the software like PDF and word processor. And from there you can format and finally get the hard copy of the document via printers.

Explanation:

Various kinds of the printers are available. And all of them take the text and pictures on the computer screen, and then print that on the paper. The details are in the answer section. And some of the examples of the printers are like dot matrix printer, laser printer etc.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Yahoo! allows users to create personalized my yahoo! pages. users can add or delete a variety of information from their personal
    8·2 answers
  • Haley is helping to choose members for a customer satisfaction team. Which
    6·1 answer
  • Find the inverse function of f(x)= 1+squareroot of 1+2x
    6·1 answer
  • Please help explain this calculator code.
    15·1 answer
  • Choose and explain, step by step, one method of backing up student files either manually or using a cloud service.
    10·1 answer
  • What are some other ways to program a robot to navigate a complicated environment other than straight paths and right angle (90
    15·1 answer
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • A non-profit organization decides to use an accounting software solution designed for non-profits. The solution is hosted on a c
    11·1 answer
  • Software piracy is acceptable as it helps us obtain software cheaper or sometimes even for free.
    11·2 answers
  • What are three ways a person may use a computer without realizing it?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!