1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna11 [10]
3 years ago
5

The size of an array (how many elements it contains), which is accessed by .Lenth() returns (Choose the best answer)

Computers and Technology
1 answer:
Wewaii [24]3 years ago
5 0

Answer:that creates the array, puts some values in it, and displays the values. ... assign a value to each array element and print for (int i = 0; i < anArray.length; i++) ... Array; Array Initializers; Accessing an Array Element; Getting the Size of an Array ... not create an array and does not allocate any memory to contain array elements.

Explanation:

You might be interested in
Which statement describes a characteristic of SRAM in a PC?
svlad2 [7]

It is used for cache memory.

Further Explanation:

Cache memory is the memory that stores the instructions and data that is used repeatedly. If the processor wants some data it first looks into cache memory then the processor doesn't has to look into the main memory for the data or instructions which is more time consuming. As the SRAM uses small but a constant source of power, it is usually used for making cache memories. Moreover it is benficial to keep the previously used data in SRAM(Which is faster) than acessing DRAM (Which is way more slow than SRAM.

  • Learn more about RAM in brainly.com/question/10602589
  • brainly.com/question/5159824
  • brainly.com/question/6062548

#LearnwithBrainly

8 0
3 years ago
Why would a programmer want to overload operators rather than use regular member functions to perform similar operations?
Harlamova29_29 [7]
The Programmer wants to overload operators rather than use a regular member of the functions to perform similar operations because of two main reasons:
1. For easy and simpler definition of the functions. There would be one pointer who will call the function every time is needed in the program.
2. For easier comparisons of parameters.
4 0
4 years ago
Which sentence is an example of constructive statement
creativ13 [48]

Answer:

Which sentence is an example of a constructive I statement? “I think you are lazy; you never complete any work on time.” “I think you handled the problem in a very clever way.” “I feel stupid because I don't speak English well and can't converse with anyone here.”

Explanation:

5 0
4 years ago
I need some helpppppppppopoppppppppp
Yuri [45]

Answer:

Adding images: picture drawing box and insert tab

Formatting images: crop and picture styles

Explanation:

picture drawing box and insert tab would be options to add images

formatting (or editing) the images would be crop, and picture styles

4 0
3 years ago
Read 2 more answers
Several different tunneling protocols can be used in dial-up situations. Which of the following would best be used as a VPN tunn
melomori [17]

Answer:

The answer is the point - to -point protocol, which allows user to set a secure VPN connection for client and server connectivity.

Explanation:

A virtual private network is a private-public network because of encryption and tunneling to ensure the integrity of the data. VPN requires a tunnel to work and encryption.

In VPNs, there are different protocols can be used, such as point- to - Point Tunneling Protocol (PPTP), IPSec, and L2TP.

Point to Point Protocol is a Microsoft protocol which allows user to set a connection and secure VPN destination. Point to point protocol is designed for client and server connectivity. It developed a connection between two computers. The data link layer that transmits over IP networks is used for point to point tunneling.

Such as option A is not correct because it is distracter and IPSecis primary tunneling protocol. It supports only IP networks. L2TP is not a VPN but extend VPN over the various network.

3 0
4 years ago
Other questions:
  • Într-o școală sunt n clase, fiecare având un număr diferit de elevi. Școală primește m pachete cu cărți, fiecare cu un număr dif
    15·1 answer
  • Which of the following refers to semitransparent text or a faint object that appears
    15·1 answer
  • How do say phone in French?
    10·2 answers
  • . Reorder the following efficiencies from smallest to largest:
    9·1 answer
  • For most applications, saving sound files at the _____ bit resolution provides a good balance of sound quality and file size.
    15·2 answers
  • Sally needs to teach her class how to convert a decimal number to a binary number. What is the first step she should take to sta
    5·1 answer
  • If you were to create a new app for a smartphone or tablet that does not already exist, what would you create?
    10·1 answer
  • Which of the following is NOT a type of cable used in wired networks?a) Unshielded coaxialb) Coaxialc) Unshielded twisted-paird)
    12·1 answer
  • Which of the following is true regarding a class and interface types? Group of answer choices You can convert from a class type
    9·1 answer
  • What is the awnser ?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!