1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
3 years ago
10

Assume the availability of an instance variable arr that refers to an ArrayList of Strings. Write a helper method concatAll that

returns the concatenation of all the Strings in the ArrayList in the order in which they appear in the ArrayList
Computers and Technology
1 answer:
rewona [7]3 years ago
7 0

Answer:

Explanation:

The following code is written in Java and is a method that takes in an ArrayList as a parameter, it then loops through the ArrayList and adds each element to the instance variable called arr as well as a space between each element (this can be removed by deleting the " "). Finally, it prints the final result of the variable arr to the screen.

public static void concatAll(ArrayList<String> myArr) {

       String arr = "";

       for (int x = 0; x < myArr.size(); x++) {

           arr += myArr.get(x) + " ";

       }

       System.out.println(arr);

   }

You might be interested in
Units for measuring computer memory
lyudmila [28]

A kilobyte (KB) is 1,024 bytes, not one thousand bytes as might be expected, because computers use binary (base two) math, instead of a decimal (base ten) system. Computer storage and memory is often measured in megabytes (MB) and gigabytes (GB). A medium-sized novel contains about 1 MB of information.

6 0
4 years ago
Which practice is the safest way to sit at a desk while typing on the computer?
qwelly [4]
Lol just lay back and unleash your gamer side
8 0
4 years ago
What specific authentication method has no encryption for user credentials or data, and is not recommended for most applications
GrogVix [38]

Answer:

PAP authentication method

Explanation:

PAP known as Pass word authentication protocol Basically, PAP works like a standard login procedure; the remote system authenticates itself to the using a static user name and password combination, so not recommended for applications.

6 0
3 years ago
All of the following are examples of roadblocks to achieving a goal except
Volgvan
Having to many goals
6 0
3 years ago
Read 2 more answers
An employee is working on building a new computer application for a friend. For this purpose, he uses the software that is regis
andrezito [222]

Answer: USed software

Explanation:

5 0
3 years ago
Other questions:
  • What portable computing devices, designed for user convenience, have a sensor called an accelerometer that senses vibrations and
    10·1 answer
  • A user printed several documents to a shared network copier and noticed that they have very faint color density. A technician in
    9·1 answer
  • If your computer has a ________, someone else can gain access to it undetected.
    10·1 answer
  • What are the three types of mergers?
    8·1 answer
  • Actors,narratirs,and other people whi appear in video programs collectively called what?
    15·1 answer
  • The light source for a typical silhouette is generally___________ the subject.
    12·2 answers
  • ANSWER ASAP IF CORRECT I GIVE BRAINLIEST
    7·2 answers
  • Which of the following describes why graphical interfaces quickly became popular after their introduction to the mass market?
    5·1 answer
  • ________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Hum
    9·1 answer
  • Which statement best describes one reason why assembly language is easier
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!