1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
abruzzese [7]
3 years ago
15

How many parameters can we use in each function?

Computers and Technology
1 answer:
kari74 [83]3 years ago
8 0

Answer:

As many as we need

Explanation:

https://quizizz.com/admin/quiz/5e68ffb7ada381001bd58b3a/codehs-unit-2-lessons-13-to-19

You might be interested in
What is the output of the given code?<br><br> A. Compiler error<br> B. 0505<br> C. Smooth<br> D. 0.0
oksano4ka [1.4K]

Answer:

The answer is A. Compile error

Explanation:

In the class Fabric, fabricID has private access. You can only print out out private variables in the class or function they are assigned in.

ps: sorry if I am wrong, I am kind of new to java

6 0
3 years ago
Pleaseeeeeeeee I will give a brainliest
gogolik [260]

Answer:

Below the subject

Explanation:

6 0
3 years ago
A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv
mel-nik [20]

Answer: True

Explanation:

Digital forensic analysts are the people who examine digital devices such as cameras, mobile phones and computers in order to get evidence of crime.

The evidence gotten by them can then be used to provide support to criminal investigations and can also be given to the intelligence agencies. Their function is to get back and safeguard the digital data which are related to cybercrime investigations as well as criminal investigations.

6 0
3 years ago
Helloooooo people, thats all I just wanted to say :D​
Salsk061 [2.6K]

Answer:

Hi also thank you for the points very much appreciated.

6 0
3 years ago
When on a LAN switch DHCP snooping is configured the networks that can be accessed by which clients?
kompoz [17]

Answer:

The network is accesible just for the whitelisted clients configured in the switch connected to the DHCP server

Explanation:

DHCP snooping main task is to prevent an unauthorized DHCP server from entering the our network.

Basically, in the switch we define the ports on which the traffic of the reliable DHCP server can travel. That is, we define as “trust” the ports where we have DHCP servers, DHCP relays and trunks between the switches.

8 0
4 years ago
Other questions:
  • Commands are organized into tabs on the A. Ribbon. B. Quick Access toolbar. C. Status bar. D. ruler.
    13·2 answers
  • What is the function of the Status bar in Outlook 2010?
    9·1 answer
  • If a cheetah covers 155 meters in 5 seconds, at what speed is the cheetah running?
    14·2 answers
  • Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port
    12·1 answer
  • This diagram shows a number of computing devices connected to the Internet with each line representing a direct connection.
    11·1 answer
  • How long does it take to send a 3 MiB file from Host A to Host B over a circuit-switched network, assuming:
    13·1 answer
  • The rules on the Internet for how messages are addressed and passed on are called ____ .
    15·1 answer
  • Discuss the objectives of business 8 marks​
    10·2 answers
  • Which IDEs support multiple high-level programming languages? Select all that apply.
    13·1 answer
  • Can someone help answer this. I'm on a time crisis rn and need to pass or I fail the class. There are games that cannot be descr
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!