1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PSYCHO15rus [73]
3 years ago
7

FELLING GENEROUS GIVING AWAY POINTS:)

Computers and Technology
1 answer:
Liula [17]3 years ago
3 0

Answer:

thanksssssssss

You might be interested in
Assume that you have an ArrayList variable named a containing 4 elements, and an object named element that is the correct type t
jonny [76]

Answer:

Option (4) is the correct answer.

Explanation:

In Java programming language ,array collection starts from 0 index location and ends in a size-1 index location. So to access the last elements the user needs to use a[Size-1] statement. so to modify the value of the last location of the array the user needs to use "a[size-1]= element;".

But when the user wants to add some new value to the end of the array list collection then he needs to use the statement--

a.add(element); //where add is a function, element is a value and a is a array list object.

Another option is invalid because--

  • Option 1 is not the correct because "a[3]=element;" modify the value of the 3rd element of the array.
  • Option 2 gives a compile-time error because add functions bracts are not closed.
  • Option 3 gives the error because a[4] gives the location of the 5th element of the array but the above question says that a is defined with 4 elements.
7 0
3 years ago
What is security in Technology<br>​
maria [59]

Answer:

IT security is a set of cyber security strategies that prevents unauthorized access to organizational assets such as computers, networks, and data.

3 0
3 years ago
Read 2 more answers
Think of a recent occasion when you became upset with a friend or family member. How did you handle the situation? How did you c
bekas [8.4K]

Answer:

You would identify the problem together with the person or persons involved.

Explanation:

4 0
3 years ago
Gps receivers are commonly used by individuals to determine their geographic location while hiking and to obtain driving directi
soldier1979 [14.2K]
I think it is true also.
7 0
3 years ago
It is not necessary to develop strategies to separate good information and bad information on the internet. True or False
Reptile [31]

The answer is False. You should always try to separate the information that could do harm, or isn't true.

6 0
3 years ago
Other questions:
  • You are going to write a program for Computer test which will read 10 questions from a file, order them randomly and provide the
    11·1 answer
  • Is a network where connected devices are located within the same building.
    5·2 answers
  • In 1970, the federal government created __________ to both assist and require employers and employees to make the prevention of
    14·1 answer
  • The ____ command is used to disconnect a datatable object from the database. (
    15·2 answers
  • The birthday problem is as follows: given a group of n people in a room, what is the probability that two or more of them have t
    12·1 answer
  • The overall cost of wiring in addressable fire alarm system is significantly cheaper than the conventional one. Why is it so?
    14·1 answer
  • How can a search be narrowed to only search a particular website????
    15·1 answer
  • Reply emailing a student who is asking about audio materials​
    6·2 answers
  • What are the top 10 most dangerous computer viruses ?
    13·1 answer
  • You discover that the lecturers will be using the laptops for online and video lecturing, and you see the need to upgrade the RA
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!