1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
3 years ago
10

Write a method named square that accepts an integer argument and returns the square of that argument.

Computers and Technology
1 answer:
BaLLatris [955]3 years ago
7 0

Answer:

The method is as follows:

double square(int num){

return num*num;

}

Explanation:

Written in C++

This first line defines the method

double square(int num){

This line returns the square of num

return num*num;

}

<em>I've added the full program as an attachment where I include the main method</em>

Download cpp
You might be interested in
How do we call a very small video,that is repeating unlimitedely
labwork [276]
A very small video that is continuous is called a GIF, which stands for Graphics Interchange Format.

 
3 0
3 years ago
Read 2 more answers
Suppose there are 69 packets entering a queue at the same time. Each packet is of size 7 MiB. The link transmission rate is 1.7
svp [43]

Answer:

69.08265412 milliseconds

Explanation:

Lets first convert 7 MiB to bits

7*1024*1024*8=58720256 bits

Now convert bits to Gbits

58720256/10^{9}  =0.058720256 Gbits

Queuing Delay = Total size/transmission link rate

Queuing Delay= \frac{0.058720256}{1.7} =0.03454132706 seconds

Delay of packet number 3 = 0.03454132706*2=0.06908265412 seconds

or 0.06908265412= 69.08265412 milliseconds

7 0
3 years ago
After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identifie
Aneli [31]

grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities

  • A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.

  • In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.

Conclusively we can therefore say that the hacker was a gray hat hacker.

Learn more from

brainly.com/question/15899195

3 0
3 years ago
____________ approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is o
Vitek1552 [10]

Answer:

Symmetric encryption or single key encryption

8 0
3 years ago
Scannable résumés are: a. Written by hand and then scanned b. Typed on a typewriter c. Created in a word-processing program d. R
Rudiy27

The answer is : C. Created in a word-processing program.  Scannable Resumes are those that were created in a word-processing program.  It is much more presentable and one can use the file by sending thru email as an attachment to the application letter,

8 0
3 years ago
Read 2 more answers
Other questions:
  • Alice has to move around a lot to fetch objects at her workstation. Which ergonomic principle should Alice follow to prevent str
    8·2 answers
  • 7. While an adjacency matrix is typically easier to code than an adjacency list, it is not always a better solution. Explain whe
    5·1 answer
  • 2) Describe how data becomes knowledge.​
    10·1 answer
  • Which folders are commonly used in the navigation pane of outlook
    5·1 answer
  • Proper __ management is essenciales for meeting project deadlines​
    11·1 answer
  • Which of the following is not a compilation error? Group of answer choices a. Placing a semicolon at the end of the first line o
    13·1 answer
  • I have a question. This question will probably be deleted, but why do moderators keep deleting my answers when they are legitima
    13·1 answer
  • Which of the following things can
    6·2 answers
  • The TCP congestion control measure techniques fall into two categories: retransmission timer management and ________ management
    13·1 answer
  • Use a slicer to filter the data in this table to show only rows where the Category value is Coffee or Meals
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!