TRUE,
It's true that the order by clause sorts the final results rows in ascending or descending order.
What is ORDER BY Clause?
The ORDER BY keyword is used to arrange the result set in ascending or descending order.
The ORDER BY keyword always sorts the records in ascending order by default manner. To sort the records in the descending order, we must use the DESC keyword.
Syntax:
The basic syntax of the ORDER BY clause is given below −
SELECT column-list
FROM table_name
[WHERE condition]
[ORDER BY column11, column22, .. columnNN] [ASC | DESC];
The ORDER BY clause can contain more than one column. Check that the column you're using to sort that column is in the column-list.
To know more about ORDER BY Clause, visit: https://brainly.com/question/14544898
#SPJ4
an application of a broad-spectrum insecticide is warranted when insect-pest damage is causing loss of a turf stand.
a. true
b. false
This problem can be solved using the pascal principle, which is applied for both pressures and volumes. In this case we use the definition of volumes, which says that the volume displaced fluid on one side of the Pistons should be equal to the volume displaced on the other side of the piston.
What is force?The force exerted at the large piston will be double in magnitude in comparison with the force applied at the smaller piston.
We know, according to the pascal's law,
The pressure applied at any point in the incompressible fluid is equal in magnitude at each and every point.
So,
P = Force/Area
Where P is pressure,
If pressure is same, then we can write,
F₁/A₁ = F₂/A₂
Where,
F₁ is the force applied at the small piston,
A₁ is the area of the smaller piston,
F₂ is the force at the larger piston,
A₂ is the area of the larger piston,
It is also given that, area if the larger piston is two times the area of the smaller piston so,
A₂ = 2A₁
So, putting the values we get,
F₂/F₁ = 2
So, F₂ = 2F₁
It means that the force exerted by the larger piston will be double in magnitude.
Therefore, In this case we use the definition of volumes, which says that the volume displaced fluid on one side of the Pistons should be equal to the volume displaced on the other side of the piston.
To know more about Pascal's Law, visit,
brainly.com/question/4262025
#SPJ1
Network segmentation at layer 2 of the osi model is accomplished using vlans.
a. True
b. False
a. TRUE
It's true that the Network segmentation at layer 2 of the osi model is accomplished using vlans.
What is OSI Model?
The Open Systems Interconnection (OSI model) defines seven layers by which the computer systems communicate over a network. It's the first standard model for network communications, and it has been adopted by all major computer and telecommunications companies in the early 1980s.
Instead of the more complicated OSI model, the modern Internet is based mostly on simpler TCP/IP model. The OSI 7-layer model, on the other hand, is still widely used because it helps visualize and communicate how networks work, as well as isolate and troubleshoot networking problems.
To know more about OSI Model, https://brainly.com/question/22709418
#SPJ4
the original version of the secure hash algorithm was developed by mit.
a. true
b.false
True the original version of the secure hash algorithm was developed by mit.
What is a secure hash algorithm?
Using SSH keys is more safe than using passwords when connecting over a long distance. MIT created the Secure Hash Algorithm's initial iteration. Unusual error messages with no known cause and sudden, unexplained increases in file sizes are both possible signs of a viral infection.
The most secure hashing method available as of this writing is SHA-256. It is used to safeguard sensitive data by numerous software companies and institutions, including the US government, and has never been reverse-engineered.
Hence to conclude the SHA-256 is the secure hash algorithm that helps in connecting the passwords over long distance
To know more on hashing algorithms follow this link:
https://brainly.com/question/24927188
#SPJ4
__________ software may be freely copied, distributed, and even resold.
Answer:
Public domain
Explanation:
Which of the following should be defined as a void method?
A. Write a method that prints integers from 1 to 100.
B. Write a method that returns a random integer from 1 to 100.
C. Write a method that checks whether current second is an integer from 1 to 100.
D. Write a method that converts an uppercase letter to lowercase.
Write a method that prints integers from 1 to 100. defined as a void method.
What is void method?
A void method is a type of method in programming that does not return a value. It's often used for operations that perform an action, such as printing something to the console or performing a calculation, but don't need to return a result. Void methods are declared with the keyword void before the method name and don't require a return statement. However, void methods can contain return statements for special cases. Void methods are most commonly used in Java and C#, although other programming languages may also support them. Void methods are useful for performing tasks that don't need to return a value, such as printing to the console or performing a calculation. They can also be used in conjunction with other methods to control the flow of a program.
To learn more about void method
https://brainly.com/question/19360941
#SPJ1
processors that execute one instruction at a time are considered to be ________ processors
Processors that execute one instruction at a time are considered to be serial processors
How does serial data processing work?In computing, one single set of instructions can only be processed by a CPU at a time, in which case it is referred to as a single-core processor. A CPU is referred to as having two cores if it can process two sets of instructions at once; a CPU with four cores is said to have four cores.
Therefore, for one to be able to attend to and process one thing at a time is known as serial memory processing. Parallel memory processing, which is seen as the act of attending to and processing all items simultaneously, is one that is used to contrast this.
Learn more about serial processors from
https://brainly.com/question/21304847
#SPJ1
hannah has been working for your company for several years. recently, she moved to a new department, which is located on a different floor. after the move, hannah informs you that when she tries to print a microsoft word document (the same program she has always used), the printer on her new floor prints page after page of seemingly random characters. which of the following is the most likely cause of hannah's print problems?
The wrong print driver has been selected is the most likely cause of hannah's print problems.
What are the common problems of printers?When they run out of paper, ink, or toner, or if the printer senses a problem with the ink or toner cartridge, most printers will cease functioning. When this happens, your printer may display an error message or have blinking green or amber lights.Even though your cartridge is fully charged and ready to go, it can have moved just enough to lose electrical contact with the printer. Simply removing and reinstalling the cartridges is the simplest solution to this possible issue.Find Diagnose & Fix for Windows and Mac computers, then launch it. Open Diagnose & Fix first, then the Smart software. Windows: In the lower left corner, click the Diagnose & Fix icon. macOS: Select the printer you want to fix, go to Printers in the top menu bar, and then select Diagnose & Fix.Learn more about print problems refer to :
https://brainly.com/question/11172053
#SPJ1
in a structure chart, a(n) line, with a diamond on one end, indicates that a control module determines which subordinate modules will be invoked.
A(n) condition line with a diamond on one end in a structure chart denotes that a control module chooses which subordinate modules will be called.
which denotes the repetition of one or more modules?A loop in a structure diagram denotes the repetition of one or more modules.It stands for the control transmission between the units. A directed arrow with a filled circle at the end is used to depict it.All of the program modules' inputs, outputs, and processing logic are described. The system analysis phase is where the program documentation process begins, and it continues through implementation.In order to test the new system, one location is selected to serve as the pilot site. Prior to rolling out the new software across all of its sites, this enables the business to pinpoint issues and discover solutions.A firewall is a device used to block unauthorized access to or outbound connections to a private network.To learn more about the repetition of one or more modules refer to:
https://brainly.com/question/29447606
#SPJ4
what is a siem (security information and event management) system utilized for?
Organizations can effectively gather and analyze log data from all of their digital assets using SIEM(security information and event management). In order to investigate suspicious activity and put more effective security procedures in place, they can use this to recreate previous incidents or analyze brand-new ones.
What is SIEM?
In the area of computer security known as security information and event management, software products and services integrate security information management and security event management.
They offer in-the-moment analysis of security alarms produced by software and network hardware. You may be familiar with ArccSight ESM (Enterprise Security Management), ATandT Cybersecurity (formerly known as AlieenVault), Fortinete, IBMM QRaadar, McAffee SIEM, and Spluunk as examples of SIEM. The scope of the software and the necessary resources make it an impractical choice for the majority of small firms.
To learn more about security information and event management, use the link given
https://brainly.com/question/29659600
#SPJ4
pr professionals use webcasts to stream press conferences and other public events over the internet to reach audiences who cannot attend the event in person.
PR professionals use webcasts to stream press conferences and other public events over the internet to reach audiences who cannot attend the event in person is true.
What is webcasts?
Webcasts is defined as a media presentation delivered via the Internet that makes use of streaming media technologies to give access to a single content source to numerous listeners and watchers at once.
A kind of strategic communication that strengthens connections between corporations and their audiences. To build, preserve, and safeguard the company's reputation, increase its status, and offer a positive picture.
Thus, PR professionals use webcasts to stream press conferences and other public events over the internet to reach audiences who cannot attend the event in person is true.
To learn more about webcasts, refer to the link below:
https://brainly.com/question/9165574
#SPJ1
Assume you have three arrays, A,B,C, holding elements of size 8 bytes each. Assume the base address of A is stored in $t0, that of B in $t1, and that of C in $t2. Convert the following C code to RV64I assembly code. A[i]=B[C[i+2]]; Assume the i variable is stored in $t3.Your lines of assembly code should not exceed beyond 20! Make sure to comment your code.Precede your comments with "#" for better readability.You don’t need to follow any register convention while writing the code.
Load $t0[$t3] , R3 # load the content of R3 to array A to location I .
What is an Array?
An array is a type of data structure used in computer science that holds a set of elements that are all uniquely identified by at least one array index or key. Each element of an array is stored so that a mathematical formula can be used to determine its position from its index tuple.
Given that;
Load R1 , =2($t3) # load the sum of 3 and the value of $t3 to register R1.Here r1 is referred as an index register.
Load R2 , $t2[R1] # load the content of array C of location R1 to register R2.$t2[R1] = $t2 + R1
Load R3 , $t1[R2] # load the content of array B of location R2 to register R3.$t1[R2] = $t1 + R2
Load $t0[$t3] , R3 # load the content of R3 to array A to location I .
Learn more about array click here:
https://brainly.com/question/28061186
#SPJ4
to preserve an exact cell address in a copied formula, you can use a relative cell reference.
a. true
b. false
The statement to preserve an exact cell address in a copied formula, you can use a relative cell reference is False.
What is a cell address?
A worksheet cell is identified by cell address, which is made up of a column letter and a row number. For instance, A1 refers to the cell that is located where row 1 and column A meet, B2 to the second cell in column B, and so on.
Absolute cell address and relative cell address are the two different types. When copied and filled into additional cells, both relative and absolute address function differently.
To learn more about a cell address, use the link given
https://brainly.com/question/2146195
#SPJ4
when new forms of entertainment and media are developed, most people are initially suspicious of them
When new forms of entertainment and media are developed, most people are initially suspicious of them: True.
What is mass media?In Computer technology, mass media can be defined as a terminology that is used to describe an institution that is established and saddled with the responsibility of serving as a source for credible, factual and reliable news information to its audience within a geographical location, either through an online or print medium.
At the initial stage, the natural instincts of most people is usually suspicious of new forms of entertainment and mass media that are being developed because they do not know much about it.
Read more on media here: https://brainly.com/question/17658837
#SPJ1
Complete Question:
When new forms of entertainment and media are developed, most people are initially suspicious of them. True or False?
you are currently working at the administrator command prompt on the dc10 server. you need to run a series of commands to complete several management tasks on the dc13 server. dc10 and dc13 are in the same domain, but dc13 is in another building on the other side of your company campus. you want the command prompt on dc10 to behave as if it is the command prompt on dc13. use the drop-down list to fill in the blank with the switch you must use to complete the following command.
To configure the command prompt on DC10 to behave as if it is the command prompt on DC13, you would enter the following command (Cmd): winrs -r: DC13
When Multiple servers must be managed from a single Server Manager interface. To add more servers to the server management pool, you must open the Add Servers dialogue. You can select the "Manage" or "All Server" menu options.
On DC10, you are utilizing an admin-level command prompt. The DC13 server does not require management, but you must be aware of its IPConfig. The domain in which DC10 and DC13 are located. Then this command winrs -r: DC13 ipconfig would you enter to view the IP configuration of DC13.
You are the domain administrator for a number of servers. DC10 and DC13, two of the servers, are located in various structures. You want to run DC13 from DC10, where you are. On DC13, you'll use Remote MMC snap-ins to enable remote management. Because DC13 belongs to your domain, you are aware that Windows Remote Management is already enabled on that machine. The firewall exceptions (there are two) in DC13's firewall need to be activated.
Learn more about Command Prompt
https://brainly.com/question/25808182
#SPJ4
criminal investigations are limited to finding data defined in the search ____.
Criminal investigations are limited to finding data defined in the Search warrant and civil investigations are limited by court orders for discovery.
What do criminal investigations do? Criminal investigations are confined to finding data described in the Search warrant and civil investigations are limited by court orders for discovery.Criminal investigations are limited to finding data defined in the search warrant, while civil investigations are often constrained by court orders for discovery.it is vital to authenticate forensic data so that integrity of the data can be safeguarded in case it is utilized as evidence in court.Criminal Investigators investigate crimes and give law enforcement with evidence that could lead to an arrest.A person who has this position will collect any physical or electronic clues at crime scenes.Later, they make an effort to obtain information regarding what happened throughout investigative times.To learn more about criminal investigations refer
https://brainly.com/question/28320262
#SPJ4
Valerie is designing the network for the new HQ2 location of her company. HQ2 is located on the United States east coast, but the primary headquarters is located in the United States Pacific northwest. She wants to ensure that file servers in both locations can be accessible by all users, regardless of location. Which of the following types of connections might she choose to include in the configuration?
a. WAN b. CAN c. MAN d. LAN
It is to be noted that Valerie is designing the network for the new HQ2 location of her company. HQ2 is located on the United States east coast, but the primary headquarters is located in the United States Pacific Northwest.
She wants to ensure that file servers in both locations can be accessible by all users, regardless of location. The type of connections that might she choose to include in the configuration is MAN - Metropolitan Area Network. (Option C)
What is Metropolitan Area Network?A metropolitan area network (MAN) is a digital network that links computers within a metropolitan region, which can be a single major metropolis, a collection of cities and towns, or any given large area with several buildings. A MAN is larger than a LAN but smaller than a wide area network (WAN) (WAN).
The fundamental benefit of a MAN over a WAN is the high bandwidth provided by a metropolitan area network's dedicated lines. This MAN application enables faster speeds, ranging from 1 gigabit per second to 100 Gbps, and lower latency than a WAN.
Learn more about Metropolitan Area Network:
https://brainly.com/question/1167985
#SPJ1
Tonia has been tasked with setting up a wireless network at a new branch office. She wants to make the network secure while requiring the least administrative effort. Which of the following might she choose to implement?
a. WPA2-Personal b. WPA2-WPS c. WPA2-Enterprise d. WPA2-PSK
Since Tonia wants to make the network secured while requiring the least administrative effort, the wireless security protocol that she may choose to implement is: d. WPA2-PSK.
What is encryption?An encryption simply refers to a form of cryptography and it is a process that typically involves converting or encoding information that are stored in plain text into a code, which is known as a ciphertext.
In Computer programming, some examples of encryption algorithms that are designed and developed for protecting a wireless network include the following:
WEPWPA 2WPA2-PSKWPAWPA 3In conclusion, WPA2-PSK is a wireless security protocol that works in a personal mode with a Pre-Shared Key and can be used in small office networks that requires the least administrative effort.
Read more on wireless here: brainly.com/question/14307416
#SPJ1
Using technology, calculate the difference between the arithmetic average ror and the weighted average ror. Round to the nearest tenth of a percent.
Using technology, the weighted average ROR differs by 0.52% from the arithmetic average ROR.
What is a ROR?A rate of return (RoR) is the net gain or loss of an investment over a given time period, expressed as a percentage of the investment's initial cost.
You figure out the percentage change from the start of the period to the end when calculating the rate of return.
Any investment vehicle, including real estate, bonds, stocks, and fine art, can be subject to a rate of return (RoR). Any asset can be used with the RoR as long as it is purchased once and generates cash flow later on. Investments are evaluated in part based on historical rates of return, which can be compared to assets of a similar type to determine which investments are the most alluring.
Learn more about rate of return
https://brainly.com/question/3578105
#SPJ1
recently, a windows 10 update was automatically downloaded and installed on your windows 10 system. now, your contact manager database application no longer works correctly. you want to uninstall the latest updates to see if the application starts working again. click the option you would use in the settings app to do this.
An operating system patch known as a "hotfix" fixes a specific, well-known issue.
An informational package (typically in the form of one or more files), known as a hotfix or quick-fix engineering update (QFE update), is used to correct an issue in a software product (i.e., a software bug). Hotfixes are frequently created to solve a particular consumer issue.
Originally, the word "hotfix" referred to software updates that were installed on "hot" systems, i.e., those that are active, running, and in production status as opposed to development status. A hotfix suggests to the developer that the change might have been made fast and outside of the usual development and testing processes. Due to the need for expedited development, overtime, or other urgent actions, this could raise the cost of the remedy. The hotfix could be viewed as hazardous for the user.
To know more about hotfix click here:
https://brainly.com/question/14600931
#SPJ4
Which of the following section is NOT included in the Computer Management console? a. Services and Applications b. Storage c. Printers d. System Tools
c. Printers
Printers are NOT included in the Computer Management console.
What is Computer/Microsoft Management console?
MMC employs a graphical user interface (GUI) similar to that of the Windows Explorer file manager. It's a container for actual management operations.
The MMC computer management component is found in the Control Panel's Administrative Tools folder. Device Manager, Disk Defragmenter, Internet Information Services (IIS), Local Users, and Disk Management are among the management tools included. These are known as snap-ins. They are useful for system configuration and monitoring.
The MMC console can also be used to monitor and configure other computers on the user's local area network (LAN).
To know more about Microsoft Management console, visit: https://brainly.com/question/29580015
#SPJ4
a _____ is an array of components that work together to achieve a common goal, or multiple goals, by accepting input, processing it, and producing output in an organized manner.
A system is an array of components that work together to achieve a common goal
What is a system?
In a system many components work together collectively where continuously work by taking the input and processing them accordingly for an exact and accurate output, in this process, they are organized effectively to produce certain goal and outputs
Following are the certain goals that can be observed by a system
A system can take the inputs like code and give the user output
It takes the user input in form of binary data
It takes the user's instructions and gives the necessary output with the help of an embedded system and logic
A system also helps in the ALU process
Hence to conclude a system has to perform the sequence of jobs and progress by giving the accurate and expected output
To know more on the system and its goals follow this link:
https://brainly.com/question/25594630
#SPJ4
translation is terminated when a stop codon is presented at the ________ site.
It is to be noted that translation is terminated when a stop codon is presented at the RNA site.
What is a stop codon?A stop codon is a codon in molecular biology that signifies the end of the current protein's translation process.
A stop codon is a three-nucleotide sequence (trinucleotide) in DNA or messenger RNA (mRNA) that instructs the cell to stop protein production. There are 64 distinct trinucleotide codons: 61 of which designate amino acids and three of which stop codons (i.e., UAA, UAG, and UGA).
A stop codon instructs the ribosome and transfers DNA that the process may be terminated and the new polypeptide chain released. If ribosomes and transfer DNA remain a mystery, continue reading or go to the protein synthesis page. An organism cannot create certain proteins without stop codons.
Learn more about RNA:
https://brainly.com/question/25979866
#SPJ1
With this type of key cryptography, the sender and receiver of a message share a single common key. a.Standard b.Symmetric c.Metric d.Asymmetric
Note that with this type of key cryptography, the sender and receiver of a message share a single common key - "Symmetric" (Option B)
What is Symmetric Key Cryptography?Symmetric-key algorithms are cryptographic algorithms that employ the same cryptographic keys for both plaintext encryption and ciphertext decoding. The keys might be identical, or there could be a simple transition between them.
The advantage of symmetric key encryption is that it is simple to set up. Furthermore, because this strategy is straightforward and easy to grasp, anyone may readily learn it. The only drawback is that the receiver must obtain the secret key from the sender.
Learn more bout Cryptography:
https://brainly.com/question/15205343
#SPJ1
After the header, the body of the method appears inside a set of:
A. brackets, [ ]
B. double quotes, " "
C. parentheses, ( )
D. braces, { }
After the given header, the body of a method appears inside a set of braces{}.
What is header?
A header is a section of a document or data packet that contains metadata or other information required for the main data to be processed. It is a term commonly used in information technology to describe any supplemental data that is placed before the actual data.
The header typically marks the beginning of the data. When data is sent in datagrams, the header contains important information such as the source and destination addresses, packet type and size, and other details. Similarly, the header is used for specific purposes in various types of documents.
To know more about Header, visit: https://brainly.com/question/10383512
#SPJ1
Which of the following statement(s) about global variables is(are) true?
A) If a function contains a local variable with the same name as a global variable, the global variable's name takes precedence within the function. B) A global variable can have the same name as a variable that is declared locally within a function C) A global variable is the same as a named constant. D) A global variable is declared in the highest level block in which it is used. E) A global variable is accessible only to the main function.
The statement about global variable true is :
A local variable declared inside of a function can have the same name as a global variable.
What is meant by Global variable ?As the name suggests, global variables are variables that are available everywhere in the application. They are stored in memory for the duration of the programme after being declared. This implies that they are changeable at any time by any function and may have an impact on the entire programme.
Global variables are those that have been declared outside of the specified function. These are not restricted to a particular function, therefore any available function can be used to access and alter global variables.
Global variables are those that are produced outside of a function, like in all of the aforementioned cases. Everyone can use global variables, both inside and outside of functions.
To learn more about global variable refer to :
https://brainly.com/question/12947339
#SPJ4
In ________ process, a server hosts many versions of desktop operating systems.
PC virtualization
Server virtualization
Desktop virtualization
In the Desktop virtualization process, a server hosts many versions of desktop operating systems.
What is a desktop virtualization process?
Desktop virtualization is a technology that enables users to view a desktop from a connected device by simulating a workstation load. The desktop environment and its apps are kept apart from the actual client device used to access them.
In desktop virtualization, client software (OS and apps) are abstracted from a physical thin client that connects to applications and data remotely, generally via the internet. Because of this abstraction, users can access their virtual desktop from any number of devices.
To learn more about desktop virtualization process, use the link given
https://brainly.com/question/23372768
#SPJ1
Individual often do not know how their data are ____. Select 2 option. A. Automated
B. Ued
C. Privatized
D. Collected
E. Peronalized
Answer: e or d
Explanation:
Andrade works as a system administrator in a large company that uses 1000 computers for its day-to-day operations. He needs to install a new MSI-based application on 250 computers.
Identify the quickest way to deploy the application.
a. Uploading and distributing the app on the Microsoft Store b. Using Group Policy to deploy the app to the computers c. Deploying the app to specific users instead of computers d. Manually installing the app on each computer
Using Group Policy to deploy the app to the computers to install a new MSI-based application on 250 computers.
What do group policies do?The Windows NT family of operating systems has a feature called Group Policy that regulates how user accounts and computer accounts operate. In an Active Directory environment, Group Policy offers centralised administration and configuration of operating systems, programmes, and users' settings.In essence, it gives administrators a centralised location to manage and set up users' preferences, operating systems, and apps. When applied properly, group policies can help you strengthen user computer security and fend off both internal threats and external assaults.Group policies can be used to manage applications like Office or a browser, add firewall rules, or configure operating system security. Group Policies also execute startup and login scripts and software installations.To learn more about Group Policy refer :
https://brainly.com/question/11627966
#SPJ4
climactic plot structures like the well-made play are known for careful and _________blank construction of the plot. multiple choice loose free-flowing disconnected tight
Climactic plot structures like the well-made play are known for careful and option D: tightly construction of the plot.
What is the paly about?The well-made play is seen as a dramatic genre from nineteenth-century theatre, developed by the French dramatist Eugène Scribe. It is characterized by concise plotting, compelling narrative and a largely standardized structure, with little emphasis on characterization and intellectual ideas.
Therefore, in the context of the above, A type of climactic play structure well-made plays were popular nineteenth century dramas with carefully and tightly constructed, although contrived, plots. Climactic structure is one that is identified by how closely it relates to the story's conclusion.
Learn more about plays from
https://brainly.com/question/29387349
#SPJ1
Consider the following class. The method getTotalSalaryAndBonus is intended to return an employee’s total salary with the bonus added. The bonus should be doubled when the employee has 10 or more years of service.
public class Employee
{
private String name;
private double salary;
private int yearsOfService;
public Employee(String n, double sal, int years)
{
name = n;
salary = sal;
yearsOfService = years;
}
public double getTotalSalaryAndBonus(double bonus)
{
/* missing code */
}
}
Which of the following could replace /* missing code */ so that method getTotalSalaryAndBonus will work as intended?
if (years >= 10)
{
bonus *= 2;
}
return salary + bonus;
A. if (yearsOfService >= 10)
{ bonus *= 2;
}
return salary + bonus;
B. return salary + bonus;
C. if (years >= 10)
{ bonus *= 2;
}
return sal + bonus;
D if (yearsOfService >= 10)
{
bonus *= 2;
}
return sal + bonus;
The correct class for the method getTotalSalaryAndBonus intended to return an employee's total salary with the bonus added is
if (yearsOfService>=10) {
//if yearsofservice >=10 bonus to be double
bonus *=2;
}
// return the salary+bonus as the return type is double
return salary+bonus;
Thus, option B is the correct option.
What is a class?For object-oriented programming languages, the fundamental building blocks are the class and the object. To create an object (computer science), a programmer uses an object-oriented programming language and writes a class with a predetermined structure. It specifies a group of traits and operations that apply to all objects of a particular type.
For illustration, a class might be a car, with fields for color, four tire fields, and driving. A truck, which has some similarities to but differs from a car in certain ways, could be another related class. A truck and a car could both fall into what is sometimes referred to as the "vehicle class," a third category.
Learn more about class
https://brainly.com/question/9949128
#SPJ1