1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
3 years ago
12

During execution of main(), how many user-defined methods are called? a) public static double calcTax(double cost) { return cost

* 0.15; } b) public static double calcShippingCost(double weight) { double cost; if(weight < 10) { cost = 10.0; }else{ cost = 15.5; } cost = cost + calcTax(cost); return cost; } c) public static void main(String args[]) { double cost1; double cost2; cost1 = calcShippingCost(7.5); cost2 = calcShippingCost(17.5); }
Computers and Technology
1 answer:
Dovator [93]3 years ago
8 0

Answer:

b) public static double calcShippingCost(double weight) { double cost; if(weight < 10) { cost = 10.0; }else{ cost = 15.5; } cost = cost + calcTax(cost); return cost; }

The method is called twice with arguments 7.5 and 17.5 respectively.

Explanation:

The Java program defines three user methods including the main. In the main, the calShippingCost method is called twice with 7.5 and 17.5 respectively to return double number values to cost1 and cost2.

You might be interested in
In codd's model of a relational database, data is stored in a(n) _____, which maintains information about a(
Dmitry [639]
<span>Which is not a component of a database that describes how data is stored?</span>
5 0
4 years ago
What happens in Word 2016 when the Home ribbon tab is clicked on? A dialog box is launched, containing functions relating to the
ArbitrLikvidat [17]

A group with functions relating to font and tables will open.

3 0
3 years ago
Read 2 more answers
Consider the following declaration: double[] sales = new double[50]; int j; Which of the following correctly initializes all the
vlada-n [284]

Answer:

The answer is "None of these".

Explanation:

In the given question an array "sales[]" is declared, which contains 50 double type elements, and in the next line, an integer variable j is defined, which uses a for loop. In this question two options is given, in which both are not correct, that can be described as follows:

  • In option (i), A loop is defined that, uses variable j which starts with 0 and ends with 48, So total elements are 48 that's why it is not correct.
  • In option (ii), A loop will use variable j that, starts with 1 and ends with 49, That's why it is not correct.
3 0
3 years ago
Identify a security context of interest to you. Within this context, what constitutes a direct benefit of a risk management stra
belka [17]

Here,the Preparedness of the National(National Preparedness), that which gives a description of mission areas and also provide a framework for the consideration of management of risk.

It gives an illustration of the relationship of the National preparedness mission elements of risk.

Activities aimed at prevention are also associated with the efforts for the addressing of protection efforts generally address vulnerabilities recovery efforts.

However,we see that efforts of mitigation transcends vulnerability and also consequence spectrum.

Here,the PPD-8 mission areas are central,and this is to enhance national preparedness and also for infrastructure risk management activities.

When these are developed,they contribute to the achievement of resilient and secure critical infrastructure,and these critical infrastructure risks are however seen as part of setting capability targets.

THREAT AND HAZARD IDENTIFICATION AND RISK ASSESSMENT.

"THIRA" gives a provision of an approach for the identification and assessment of risks and also the associated impacts.

Determination that THIRA process has been completed by jurisdiction,then you consider the results when undergoing the assessment of risks to critical infrastructure.

5 0
3 years ago
Please help me on this it’s due now
ivanzaharov [21]
Bottom right goes first then top right for the second part!
7 0
3 years ago
Other questions:
  • Alex has started a Google Search campaign designed to promote his online motorcycle accessories store. His store focuses on cust
    6·1 answer
  • Edhesive assignment 4 student schedule python
    10·2 answers
  • How to make changes to a file on the USB drive
    6·2 answers
  • Rae is building a website for the local chamber of commerce. this week, rae is designing and completing a page that contains a l
    6·1 answer
  • Should you ever force a CPU into<br>its socket?​
    15·1 answer
  • What is the danger of open-source software when it comes to military robotics?
    13·1 answer
  • Adam is an Engineering student but has decided that he does not want to work in that field, but in the Manufacturing career clus
    11·2 answers
  • REOLVER EL SIGUIENTE PROBLEMA: R1=1.7K, R2=33K R3=4.7K R4=5.9K R5=17K IT=20mA CALCULAR: VT, I1, I2, I3, I4, I5 Y RT
    6·1 answer
  • 1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
    10·1 answer
  • Which statement best describes network security?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!