1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viktor [21]
3 years ago
9

Is parameters should have a data type in java? True or False?​

Computers and Technology
1 answer:
Andrew [12]3 years ago
4 0

Answer:

true

Explanation:

You might be interested in
Discovery of a vulnerability in a software program can potentially be sold to the government. Group of answer choices True False
enyata [817]

Discovery of any vulnerability in a software program can potentially be sold to the government: True.

<h3>What is vulnerability?</h3>

Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.

This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.

Read more on vulnerability here: brainly.com/question/25813524

#SPJ1

4 0
1 year ago
Which one of the following business names would be rated Incorrect for name accuracy? Answer McDonald's McDonald's H&amp;M McDon
Damm [24]

McDonald's H&M McDonalds Inc is incorrect for name accuracy.

Explanation:

The correct Name is McDonald's. But Mc Donald's H&M and McDonalds inc is incorrect for name accuracy.

McDonald's is a fast-food company based in America. It has its retail outlets throughout the world. It is very famous for its burgers and french fries. It is the world's second-largest employer in the private sector. It is a symbol of globalization as it has its outlets throughout the world.

6 0
3 years ago
what could a company do if it was using a commercial wan and a vulnerability appered thst allowed attackers
Radda [10]

Answer:

The answer is below

Explanation :

If a company was using a commercial WAN and a vulnerability appeared that allowed attackers find routing information and therefore be able to eavesdrop on corporate transmissions "It is expected that such a company should try to formulate and establish Virtual Private Networks between corporate sites.

This will ultimately lead to intercepted transmissions to be unreadable. Though such means have been seen as time-consuming."

4 0
2 years ago
The Open Systems Interconnection (OSI) is a conceptual model whose purpose is to make networks more manageable. Its objectives i
andrew-mc [135]

Answer:

A. data-link layer

Explanation:

Data-link layer is the first layer and allows a contiguous sequence of bits to be transmitted through the network.

On top of it is the Network Layer and it handles the task of routing network messages from one computer to another.

Then comes the Transport Layer which is the basic layer at which one network computer communicates with another network computer.

6 0
2 years ago
You have stumbled on an unknown civilization while sailing around the world. The people, who call themselves Zebronians, do math
marshall27 [118]

Answer:

a. 6 bits

b. 1

Explanation:

Ans (a)

40 Characters need to be represent by binary coded Zebronian (BCZ) , So You will need 6 bits.

5 bits wold only give you 32 = 2 x 2 x 2 x 2 x 2 unique characters.

So 6 bits would allow you to represent 64 characters.

Ans(b)

BCD = Binrary Coded Decimal is very common in electronics, particularly it displays numerical data.

BCD Encodes each digit of a decimal number into 4 digit binary form.

Each decimal digit is indiviidually converted to oits binary equivalent

For Example : 146 , the decimal degits are replaced by 0001 , 0100 and 0110 respectively

Addition

1 0 = 10 is binary value of 2 2

+1 1 = 11 is binary value of 3 + 3

---------- -----------

1 0 1 5 Ans

Subtraction

1 1= binary value of 3 3

- 1 0 = binary value of 2 - 2

--------- -----------

0 1 1 Ans

6 0
3 years ago
Other questions:
  • which of the following is true about both the cyber community and the real community like the one you live in,i will give 10 poi
    6·1 answer
  • The concept of vertical farming allows agriculture to occur when there is not enough___Available .
    13·1 answer
  • Create a new conditional format that applies yellow fill (fourth color under Standard Colors) and bold font to values that conta
    14·1 answer
  • OSHA's mission is to: A. Ensure that all workers receive adequate workers' compensation payments B. Esnure that all workers rece
    8·2 answers
  • In the structure of a conventional processor, what is the purpose of the data path?
    15·1 answer
  • Choose all of the items that represent functions of the operating system kernel.
    15·2 answers
  • What is the command to create a compressed archive(archive1.tar.gz) of files test1 test2and test3.
    5·1 answer
  • Simplify the Boolean expression AB+(AC)`+AB`C(AB+C)
    13·1 answer
  • If a movie, song, or book is offered for free, is it malware?
    15·1 answer
  • The first time that a particular visitor loads a web site page is called a(n) _____.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!