What will be the results after the following code is executed?

```
int[] array1 = new int[25];
... // Code that will put values in array1
int value = array1[0];
for (int a = 1; a < array1.length; a++)
{
if (array1[a] < value)
value = array1[a];
}
```

a. value contains the highest value in array1
b. value contains the lowest value in array1
c. value contains the sum of all the values in array1
d. value contains the average of all the values in array1


b. value contains the lowest value in array1

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. If b|a we say that b is a divisor of a. 2. The notation a|b is commonly used to mean b divides a. ? 3. The rules for ordinary arithmetic involving addition, subtraction, and multiplication carry over into modular arithmetic. ? 4. Two theorems that play important roles in public-key cryptography are Fermat’s theorem and Euler’s theorem. ? 5. One of the useful features of the Chinese remainder theorem is that it provides a way to manipulate potentially very large numbers mod M in terms of tuples of smaller numbers.

Computer Science & Information Technology

The ________ is a window that lists all the fields from the source data for us in a PivotTable and provides an areas in which you can arrange the fields in the PivotTable

A) FITLERS area B) PivotTable Fields pane C) PivotChart D) VALUES area

Computer Science & Information Technology

The lower the time in milliseconds it takes to turn a pixel on or off on an LCD monitor, the slower the response time.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. A data file that stores a user's Outlook items. B. Delivers Internet access to a geographic location. C. A file sent along with an e-mail message. D. Routes an e-mail message and identifies the purpose or contents of the message. E. Informs the recipient or summarizes or requests information. F. Communications protocol used by many outgoing e-mail servers. G. Communications protocol used to retrieve incoming e-mail messages. H. Lists the contents of a selected folder. I. An additional copy of a file or message. J. Unsolicited e-mail messages.

Computer Science & Information Technology