Which of the following statements converts a String object named subtotalString to a double variable named subtotal?a.double subtotal = Double.toString(subtotalString);b.double subtotal = subtotalString.parseDouble;c.double subtotal = Double.parseDouble(subtotalString);d.double subtotal = (double) subtotalString

Answers

Answer 1

Answer:

double subtotal = Double.parseDouble(subtotalString);

Explanation:

Required

Determine which method converts string object to double variable

From the question;

The string object is: subtotalString

The double variable is: subtotal

From the given options (a) to (d), the option that answers the question is:

double subtotal = Double.parseDouble(subtotalString);

And it follows the syntax:

[datatype] [variable-name] = [Data-type].parse[Datatype]([string-variable])


Related Questions

Do you know the energy unit question?

Answers

Answer:

Fossil Fuels

Explanation:

Where do you go to connect to a VPN server in Windows 7?

Answers

Answer:

1) Start→Control Panel→View Network Status.

2) Click the Connect to a Network link.

3) Locate the VPN you want to connect to and click its name and then click the Connect button.

The button only appears after you click the name of the network.

To disconnect from a network, click the network name in this dialog box and then click the Disconnect button. Click Disconnect when prompted and then click Close.

4) Enter your network security key.

Most VPNs require a security key. It’s the same one you used to establish the connection.

Select the Hide Characters check box if you want to keep the Key hidden.

5) Click OK and then click the Connect button.

Windows 7 will use the key to establish a connection to the VPN network.

will give brainlyist

Which sentence in the following paragraph correctly describes mobile technology?
Mobile devices have become the main source of communication for many people around the world. However, businesses are still to capitalize on the wide reach mobile communication. Social media is being increasingly used in marketing research. Customized advertising can be integrated based on specific users' location. Smartphones do not have videoconferencing capabilities that is becoming a major business tool.

Answers

i think its the first sentence: Mobile devices have become the main source of communication for many people around the world

if im wrong im dum ;-;

Answer:

Customized advertising can be integrated based on specific users location.

Explanation:

Right for Plato/edmentum

Employment was expected to grow by 13 percent from 2010 to 2020 in which of the following fields?

A.) video game design
B.)graphic design
C.)animation
D.)computer engineering

Answers

Answer: B

Explanation:

When cropping a picture to shape, you can only turn it into a square or circle.
Select one:
O True
O False

Answers

I believe the answer is false
the answer is false!! .


Change the following sentences using 'used to
a. We went to school together.
b. How did you spend the winter evenings?
c. We had our milk delivered.
d. I was in love with him.
e. At one time there were trees in the garden.

Answers

Answer:

a. We used to go to school together.

b. How did you use to spend the winter evenings?

c. We used to have our milk delivered.

d. I used to be in love with him.

e. At one time there used to be trees in the garden.

Animations
Animations are !
Blank which can be Applied to blank in a presentation?

Answers

Animation is a graphic element that depicts movement. Animations are visual effects applied to individual items on a slide

In MIPS, all operation codes (op-codes) use ______ only.

A- 5 bits
B- 8 bits
C- 6 bits
D -32 bits

Answers

Answer:

5 bits

Explanation:

ue82ijevw8ey जभछतड।णृबदजठणब

Liquid-liquid extraction is best suited to separate a mixture of compounds when:
A. The mixture contains compounds with similar polarities but different solubilities.
B. The mixture contains compounds with similar solubilities but different molecular weights.
C. The mixture contains compounds with similar melting points but different polarities.
D. The mixture contains compounds with similar molecular weight but different polarities.
E. The mixture contains compounds with similar molecular weight but different melting points.

Answers

Answer:

A. The mixture contains compounds with similar polarities but different solubilities.

Explanation:

Liquid – Liquid (LLE) extraction is a process for the isolation of compounds or metal complexes, also known as solvent extraction and partitioning, based on their relative solubility in two distinct liquids, generally water- (polar) liquids and an organic solvent (non-polar). Net transition from a liquid to a liquid process of one or more species, normally from aqueous to organic.

Draw a flowchart or write pseudocode to represent a program's logic that allows the user to enter a value. The program multiplies the value by ten and outputs the result.

Answers

Ill choose flowchart. Look picture for the answer

ask me if you have any doubts about my answer.

Consider the declaration of the struct houseType given in this chapter. Suppose firstHouse and secondHouse are variables of houseType. Write C11 statement(s) to compare the style and price of firstHouse and secondHouse. Output true if the corresponding values are the same; false otherwise. (2, 3)

Answers

Answer:

See Explanation

Explanation:

The question is incomplete as there is no link pointing to the houseType struct of chapter 1.

So, I've answered the question from scratch

See attachment for explanation where I used comments to explain each line.

The program is as follows:

#include <iostream>

using namespace std;  

struct houseType{

   int firstHouse, secondHouse;

};

int main() {

   houseType hT;      

   cout << "Enter the price of both house: ";

   cin>> hT.firstHouse;

   cin>> hT.secondHouse;

   if(hT.firstHouse == hT.secondHouse){ cout<<"true";    }

   else{ cout<<"false";    }  

   return 0;

}

Traffic flow analysis is classified as which?

Answers

Answer:

c. An active attack

d. A passive attack​

Explanation:

Traffic flow analysis is a cyber attack method of acquiring information by intercepting and examining messages so as to decode them by analysing patterns in the way the messages are communicated.

Traffic flow analysis can either be active or passive depending on if the attacker alters communication in the case of active analysis or simply extracts information in case of passive analysis.  

Identify at least 6 errors from the following program code. Write all the errors and rewrite the correct program.(11 pts)

1. public E2
2. {
3. Public static void main(String )
4. {
5. System.Out.Println(“hello)
6. }

Answers

Answer:The code after rearrange the question segment:

public class Q// Class declaration of Q name.

{// Open the class body.

    public static void main(String[] a) // Main function declaration.

{ //Open the main-function body.

           System.out.println("Q"); // Print statement which print Q.

} //close the main-function body.

}//close the class body.

Output:

Q

Explanation:

a program execution is called ​

Answers

a program execution is called a process

Explanation

In the process, they process the data and also execute the data.

What happen in process?

First the data came from input, then go to the memory. The process take the data from the memory and process it and divide it, if there's arithmetic data thingy it will go to ALU and the rest to CU. After the data finish being proceed, the data will be sent to CU and executed there, then send back to the memory and go to the output to be shown.

#Sorry my grammar sucks

#Moderators please don't be mean, dont delete my answers just to get approval from your senior or just to get the biggest moderation daily rank.

3) Which of the following operators is used for performing exponentiation?​

Answers

Answer:

pls make more detailed

Explanation:

The operator that is used for performing exponentiation is ^. The correct option is A.

What are exponential?

One technique to determine the exponential value of the supplied base and exponent values in Python is to use the exponentiation operator. Between the base and exponent values, we utilize the (**) double asterisk/exponentiation operator.

It provides a string in exponential notation that represents the Number object. Using the syntax number.to Exponential (value) The '.' operator is used with a number to invoke the toExponential() method, as demonstrated in the syntax above.

The ^ symbol represents the exponent. This symbol is known as a carrot (). As an illustration, 4 raised to 2 can be expressed as 42 or 42.

Therefore, the correct option is A) ^.

To learn more about exponential, refer to the link:

https://brainly.com/question/28596571

#SPJ6

The question is incomplete. Your most probably complete question is given below:

A) ^

B) #

C) *

D) /

A computer connected to the internet that ask for data is a

Answers

Answer:

Client

Explanation:

When your computer is connected to the internet it is always asking and sending data. Your computer is the client which recieves the data from the sever.

Design a program named GradeDistribution.java that reads in 10 grades from the keyboard, then counts and displays grade distribution as follows:

Grade Range No.
[90 - 100] 2
[80 - 89] 5
[70 - 79] 1
[0 - 69] 1
Others 1

Answers

Answer:

[70 — 79]

Explanation:

what is the quotient of 8.16 ÷ 100​

Answers

Answer:

0.0816

Explanation:

8.16 ÷ 100 = 0.0816 (Ans)

5 disadvantage of assembly
level language​

Answers

Disadvantages Of Assembly Language

Long programs written in such languages cannot be executed on small sized computers.It takes lot of time to code or write the program, as it is more complex in nature.Difficult to remember the syntax.Lack of portability of program between computers of different makes.No SDKs (System Development Kit).

Which options can be used for totaling numbers?

Answers

Which options can be used for totaling numbers?

What are the best legendary pokemon?

Answers

PICACHU PICACHUUUUUUUUUU

Answer:

Any EX

Any GX

Pikachu

Raichu

Mew Two

Charizard

Taurus

Gumshoos

Lurantis

Lapras

Incineroar

Dialga

Guzzlord

Lugia

Darkrai

Sigilyph

Xerneas

Explanation:

There are more but it takes a little while to get them all

Example of vector image format​

Answers

Answer:

JPEGs, GIFs and PNGs are common raster image types. ...

Vector images, alternatively, allow for more flexibility. Constructed using mathematical formulas rather than individual colored blocks, vector file types such as EPS, AI and PDF* are excellent for creating graphics that frequently require resizing.

Case Study
Dr. Thomas Waggoner, an information systems professor at the local university,
is at the Will Call window at the Medallion Theatre, trying to pick up tickets he
had reserved. However, due to an oversight which turns out to be rather
frequent, his tickets were sold to another patron. Fortunately for Dr. Waggoner
and his wife, who are celebrating their wedding anniversary, the box office
manager finds two box seats which had not been claimed. In talking with the
box office manager, Dr. Waggoner starts thinking that he could perhaps help the
theatre avoid this type of problem in the future. His students could design and
build a system to help keep track of ticket sales, and hopefully help the theatre
become more efficient and improve customer satisfaction.
Q # 1 Write down the purpose of the given requirements HINT: purpose of a
system?
Q # 2 Write down the Modules and also extract the functional requirements of
the given requirements?
Q # 3 Create a use Case Diagram and Use cases of the above requirements?
Q # 4 Create a Class Diagram and its GUI interfaces of the system? NOTE:
Write down the caption on each interface.

Answers

Answer:

1. Design system to avoid theatre tickets selling issue.

2. Resources provided to student who can built a system for the theatre tickets booking.

3. Medallion Theatre Booking System

Add/edit patron

Add/edit production

Add/edit performance

Add/edit seats

Purchase tickets

Generate Tickets Sold Report

4.GUI or graphical user interface allows the user to connect through graphical icons.

Explanation:

The main purpose is to avoid problems of duplicate tickets sales in future. The system will enable the selling of each seat to one customer only and when an attempt is made to resold the seat the system warns the user creating a check for original sale. This will help theatre to avoid any issues in future and customers will be happy with their ease of confirmation of booking.

Pulling out specific differences


Answers

Answer:

Terms in this set (24) abstraction. Pulling out specific differences to make one solution work for multiple problems. algorithm. A list of steps to finish a task. binary. A way of representing information using only two options. bug. code. command. computational thinking. conditionals.

Cloud computing security risks

Answers

Answer:

Risks:

Network issues or outages caused by attackers can limit or completely deny access to data stored in the cloud

Attackers could find an exploit and steal company data without ever physically touching the company's computer.

That's what I can think of.

Explanation:

~Trivia~

Harry Potter Edition

Answer All Correct For Brainliest



What house does Harry Potter belong to in Hogwarts? __________________

What position does Harry Potter play in Quidditch? _____________________

Who is Fluffy? __________________

What does the Imperius Curse do? ___________

Answers

Answer:

What house does Harry Potter belong to in Hogwarts? Gryffindor __________________

What position does Harry Potter play in Quidditch? Seeker _____________________

Who is Fluffy? Hagrid's old cerberus __________________

What does the Imperius Curse do? ___________ places cursed under sorcer's control

Explanation:

I would like to thank SWANGOADRIANA for this answer and the ten points.

if your audience seems confused about a previous slide, in presenter view, whats the best way to jump back to a previous point in the presentation

Answers

Answer:

You can go back to that point towards the end of the presentation  or find where it would link later on in the presentation. Then you can ask if there are any questions and if the audience are willing to ask them you can go ahead and explain it.

Explanation:

1.2.6: Anonymity Reflection

1) What are some reasons a person might choose to remain anonymous on the Internet?

2) What are some harmful outcomes that stem from Internet anonymity?

3) Do you think that people have a “right” to remain anonymous online? Why or why not?

Answers

Answer:

1. they are too afraid to say it in person or are afraid of getting in trouble if they give their identity.

2.more cyber crimes committed and no filter for what is okay to say or not as they have the security no one knows who they are.

3. yes because you may not want your full personal info out there even though negative outcomes could occur from anonymity

There are several reasons why a person might choose to remain anonymous on the internet, including: privacy, security, Whistleblowing, etc.

What is Internet anonymity?

Internet anonymity is the capacity of a person to remain unidentified and anonymous online, generally through concealing or obfuscating their real identity.

A person could decide to remain anonymous on the internet for a number of reasons, such as:

Concerns about privacy: People might prefer to keep their internet activities or personal information hidden, especially if they are discussing sensitive or divisive viewpoints.Safety worries: Some people could feel unsafe or vulnerable if they reveal their identify online, especially if they have previously been the target of abuse or threats.Whistleblowing: In order to protect themselves from retaliation, those who seek to bring attention to wrongdoing or unlawful activity may decide to remain anonymous.

Internet anonymity can have a number of negative effects, such as:

Online bullying and harassment.Misinformation and hate speech propagation.Absence of responsibility.

Some contend that anonymity is an essential part of free speech and expression and that people should have the freedom to share their thoughts without worrying about being judged or subjected to retaliation.

Thus, these are some harmful outcomes that stem from Internet anonymity.

For more details regarding internet anonymity, visit:

https://brainly.com/question/13264093

#SPJ2

Case Study Dr. Thomas Waggoner, an information systems professor at the local university, is at the Will Call window at the Medallion Theatre, trying to pick up tickets he had reserved. However, due to an oversight which turns out to be rather frequent, his tickets were sold to another patron. Fortunately for Dr. Waggoner and his wife, who are celebrating their wedding anniversary, the box office manager finds two box seats which had not been claimed. In talking with the box office manager, Dr. Waggoner starts thinking that he could perhaps help the theatre avoid this type of problem in the future. His students could design and build a system to help keep track of ticket sales, and hopefully help the theatre become more efficient and improve customer satisfaction. Q # 1 Write down the purpose of the given requirements HINT: purpose of a system? Q # 2 Write down the Modules and also extract the functional requirements of the given requirements? Q # 3 Create a use Case Diagram and Use cases of the above requirements? Q # 4 Create a Class Diagram and its GUI interfaces of the system? NOTE: Write down the caption on each interface.

Answers

Answer:

1. The primary purpose of a system is system development, analysis and design to avoid inappropriate and duplicate selling of theatre tickets.

2. The function requirements are development of a system which automatically reserves the ticket when a person books it and marks it appear booked for all the customers.

3. The customers can book the ticket through online system. The system then marks the ticket as unavailable for all the other customers until and unless the original customers cancels the ticket.

Explanation:

Dr. Waggoner had an issue with ticket booking as his booking was sold to another customer. This could lead him to a bad experience at theatre but since the box office manager assisted him with another available seats. This issue has been resolved with good faith but there can be problems in future where many customers can claim a single seat. To avoid this the theatre should introduce online booking system based on computer application which can be accessed by all the customers through website.

WHY ARE APARTMENTS CALLED APARTMENTS IF THEY ARE TOGETHER LOL

Answers

Answer:

cause architects are weird

Explanation:

Explanation:

Cause apartments is apartments so therefore its called apartments

Other Questions
Locations V, W, Y and Z are all at the SAME ELEVATION... Which location would you expect to have the WARMEST CLIMATE? *Location VLocation WLocation YLocation ZThey would all probably be about the same temperature. If the mean of 5, 11, 6, 4, 7, P and 10 is 8, find the value of (P) Find the value of x. A vector has an x-componentof 6.15 m and a y-componentof -3.88 m.Find the magnitude of thevector. Find the measure of the indicated angle to the nearest degree The ___________________ of these fossil fuels releases carbon back into the atmosphere. In a bag, there are only black pins, green pins, pink pins and white pinsA pin is taken at random out of the bagComplete the table 2. What was the connection between Germany's defeat in World War I and the rise of anti- Semitism in Germany in the 1930s? (development of events) La probabilidad de que al tirar un dado, salga 1, es de 1/6. La probabilidad de que salga 3, es de 1/6. Calcular la probabilidad de que al tirar un dado, salga 1 o 3. .OF THE COMMUNITY.Teacher are an integral part of ourCommunities and societies. Through their dailyeffortswith ourchildren, theyhave a handin creating future scientist, engineers,Doctors, police and yexmore teachers andotherprofessionsorserviceATEACHERS AS THE INTEGRAL PART chapter 27 two roads summary joseph bruchac The speed of light will change in which of the following situations?A. The light moves through glass, then air.B. The source of light is rotated.C. The light becomes brighter over time.D. The light source is accelerated. Which of the following side lengths DO NOT make a right triangle? 6-8-103-4-56-8-99-12-15EXPLAIN HOW YOU FIGURED IT OUT!!! PLEASE Solve 13 = d 6. The solution is d = If f(x) = -22 - 2x -1, then f(x+1) = -x? - 2x - 4? How far can you get away from your littlebrother with the squirt gun filled withpaint if you can travel at 3 m/s and youhave 15s before he sees you?KnowFindEquationSolve What are the points on y-axis which are at a distance of 4 units from 4x+3y=12 how do you work common core math 2007 Federal Income Tax TableSingle: Over But not over The tax is$0 $7,825 10% of the amount over $0$7,825 $31,850 $788 + 15% of the amount over $7,825$31,850 $77,100 $4,386 + 25% of the amount over $31,850$77,100 $160,850 $15,699 + 28% of the amount over $77,100$160,850 $349,700 $39,149 + 33% of the amount over $160,850$349,700 And Over $101,469 + 35% of the amount over $349,700Maria Contrerras earned $53,000 in taxable income. She figured her tax from the single taxpayer table above.1. Find her earned income level.2. Entered the base amount. = $3. Found the amount over $ = $4. Multiplied line 3 by 25% = $5. Added Lines 2 and 4 = $ 2. If wea water at 100c (heat), it(boils).3. If you4.(leave) your job, you(travel) around the world.He crashed his car, because he fell asleep while driving. If he(fall) asleepwhile driving, he(crash) his car.We couldn't go to the concert, because we didn't have enough money. If we(have) enough money, we(go) to the concert.5.