1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ololo11 [35]
4 years ago
13

Provide Java code to illustrate how to create an array, reference an array, and address an element of an array.

Computers and Technology
1 answer:
tia_tia [17]4 years ago
4 0

Answer:

Hi!

<u>To create an array:</u>

type[] varname OR type varname[]

where:

  • type is the class of the array.
  • var-name is the name of the variable.
  • [] indicates that the instance would be an array.

Examples:

float floatArray[];

boolean[] booleanArray;

String[] stringArray;

Object objectArray[];

<u>To reference an array:</u>

type varname1[];

type varname2[] = varname1;

where:

  • After assign varname1 to varname2, varname2 points to the elements of varname1;

<u>To address an element in an array</u>:

type varname[n];

type i = varname[i];

If you want to access to the i element of the array you can do : varname[i];

You might be interested in
mta software development fundamentals You are creating an application that accepts input and displays a response to the user. Yo
Harlamova29_29 [7]

Answer: Console-Based

Explanation:

A console based application is an application that helps in facilitating the reading and the writing of the characters from a console.

It is vital in the provision of a simple user interface for the applications that requires little interaction. Since the application accepts input and displays a response to the user and cannot create a graphical interface for this application, then it's a console based application.

8 0
3 years ago
What is the title of RFC 4890 and what year was this RFC published?
Phantasy [73]

Answer:

The title of RFC 4890 is "Recommendations for Filtering ICMPv6 Messages in Firewalls" and it was published in 2007.

Explanation:

RFC 4890 is the memo that was published in 2007. This document is about the recommendations of filtering messages that are harmful and having security risk for Internet Control Message Protocol ICMP version 6.

In this document different types of risk associated ICMPv6 protocol while forwarding messages. This memo recommends filtering techniques to drop the harmful messages and make the communication secure.

4 0
3 years ago
What do you do to think positive and maintain discipline to play
Agata [3.3K]

Answer:

to make peaceful mind.to develop our character..

6 0
3 years ago
What is one major component that would not be found in a tablet or phone, and how has modern computing made that component less
IRISSAK [1]

Answer:

A hard drive

Explanation:

Since tablets and phones are compact, they are better off not having a big, giant, bulky storage device like hard drives. Modern computing made hard drives less important by developing Solid-State Drives (SSDs) and extremely dense (512 bit) storage that can provide the same if not more storage than a traditional hard drive at the fraction of the size.

5 0
4 years ago
Read 2 more answers
When implementing best practices, you will use external standalone firewalls whenever possible, but you won't go without a built
Andrews [41]
The answer is true

Technically, we have two types of firewall, a one way firewall and a two way. A one-way firewall will protect you from incoming threats. A two-way built-in or standalone firewall will add another layer of protection and thus, it is a must have tool.


8 0
3 years ago
Other questions:
  • In dt.py, you will implement a basic decision tree classifier for
    5·1 answer
  • Explain possible consequences if someone is issued with a fraudulent licence
    6·1 answer
  • What is the rationale behind the development of an operating system in computing?
    15·1 answer
  • What is an Algorithm? (might not be in the chapter text). Give an example.
    13·1 answer
  • Has anyone used freya on Mobile legends bang bang
    8·2 answers
  • How many total cells can a worksheet window contain? If columns are labelled alphabetically, what will be the label for the cell
    15·1 answer
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
  • A _____ is a computer that is deliberately set up to be easily hacked into.
    10·1 answer
  • How does the quantity of data affect the accuracy of an experiment?
    7·1 answer
  • What is the purpose of the GETPIVOTDATA function?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!