تسجيل الدخول
تذكر
تسجيل
الأسئلة
الأسئلة غير المجابة
الوسوم
الأعضاء
اطرح سؤالاً
اطرح سؤالاً
(7) Which of the following key word is used to create an object in Java? (a) int (b) Float (e) statio (d) New
0
تصويتات
سُئل
مايو 20، 2024
بواسطة
مجهول
(7) Which of the following key word is used to create an object in Java?
(a) int
(b) Float
(e) statio
(d) New
من فضلك
سجل دخولك
أو
قم بتسجيل حساب
للإجابة على هذا السؤال
1
إجابة واحدة
0
تصويتات
تم الرد عليه
مايو 20، 2024
بواسطة
مجهول
(d) New
تعليقك على هذه الإجابة:
اسمك الذي سيظهر (اختياري):
أعلمني على هذا البريد الإلكتروني إذا تم إضافة تعليق بعدي:
أعلمني على بريدي الإلكتروني إذا تم إضافة تعليق بعدي
نحن نحرص على خصوصيتك: هذا العنوان البريدي لن يتم استخدامه لغير إرسال التنبيهات.
مرحبًا بك إلى يزيد، حيث يمكنك طرح الأسئلة وانتظار الإجابة عليها من المستخدمين الآخرين.
اسئلة متعلقة
0
تصويتات
1
إجابة
Which of the following definitions best matches for the term Consumer Profiling? a.occurs when someone steals key pieces of personal information to impersonate a person. This information may includesuch data as name, address, date of birth, Social Security number,passport number, driver’s license number, and mother’s maiden name. b.A number of advances in information technology—suchas surveillance cameras, facial recognition software, andsatellite-based systems that can pinpoint a person’sphysical location—provide exciting new data-gatheringcapabilities. c.Companies openly collect personal information about Internetusers when they register at Web sites, complete surveys, fill out forms, or enter contests online. d.Many organizations have developed a policyon the use of IT in the workplace
سُئل
أبريل 23
بواسطة
مجهول
0
تصويتات
1
إجابة
which of the following in not related to standards of reporting f Select one: Flag a. normative disclosures in the financial statements are to be regarded as reasonably adequate unless otherwise stated in the report. b. All of the above are standards of reporting c. The report shall contain either an expression of opinion regarding the financial statements, taken as a whole, or an assertion to the effect that an opinion cannot be expressed d. The report shall identify those circumstances in which such principles have not been consistently observed in the current period in relation to the preceding period e. The report shall state whether the financial statements are presented in accordance with generally accepted accounting principles
سُئل
أغسطس 7، 2024
بواسطة
مجهول
0
تصويتات
1
إجابة
which of the following in not related to standards of reporting Select one: of a. normative disclosures in the financial statements are to be regarded as reasonably adequate unless otherwise stated in the report. Jestion b. All of the above are standards of reporting c. The report shall contain either an expression of opinion regarding the financial statements, taken as a whole, or an assertion to the effect that an opinion cannot be expressed d. The report shall identify those circumstances in which such principles have not been consistently observed in the current period in relation to the preceding period e. The report shall state whether the financial statements are presented in accordance with generally accepted accounting principles
سُئل
أغسطس 8، 2024
بواسطة
مجهول
0
تصويتات
1
إجابة
LinkedList link=new LinkedList(); link.add("a"); link.add("b"); link.add(10); System.out.println("The contents of array is" + link); System.out.println("size of an linkedlist is " + link.size()); What is output of linkedList in java? a.The contents of array is[b, 10, a] size of an linkedlist is 3 b.The contents of array is[10, b, a] size of an linkedlist is 10 c.The contents of array is[a, b, 10] size of an linkedlist is 3 d.The contents of array is[a, b, 10]size of an linkedlist is 2
سُئل
أبريل 22
بواسطة
مجهول
0
تصويتات
1
إجابة
Which of the following description best suits for the term Rootkit? a.It is the act of using e-mail fraudulently to try to get the recipient to reveal personal data. b.It is one in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks. c.It is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. d.E-mail spam is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people. Most spam is a form of low-cost commercial advertising
سُئل
مارس 13
بواسطة
مجهول
...