public class scopeRule                                //Line 1{                                                     //Line 2    static double intRate = 0.055;                    //Line 3    static String name;                               //Line 4    static int t;                                     //Line 5    public static int main(String[] args)             //Line 6    {                                                 //Line 7        int first;                                    //Line 8       

double u, t;                                  //Line 9        String str;                                   //Line 10        //...                                         //Line 11    }                                                 //Line 12    public static int first(int x, int y)             //Line 13    {                                                 //Line 14        int t;                                        //Line 15        //...                                         //Line 16    }    public static double salary;                      //Line 17    public static void funcOne(int first, double x)   //Line 18    {                                                 //Line 19        char ch;                                      //Line 20        int y;                                        //Line 21            //block one                                   //Line 22        {                                             //Line 23            int u = 18;                               //Line 24            //...                                     //Line 25        } //end block one                             //Line 26    }                                                 //Line 27}                                                     //Line 28Which of the following identifiers seen in the accompanying figure is visible in method first?

A. intRate (Line 3)
B. local variables of method funcOne
C. u (Line 24)
D. first (Line 8)

Answer: A

Computer Science & Information Technology

You might also like to view...

Words with the same meaning are called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Tom believes that a customer of his Internet service provider has been exploiting a vulnerability in his system to read the email messages of other customers. If true, what law did the customer most likely violate?

A. ECPA B. CALEA C. HITECH D. Privacy Act

Computer Science & Information Technology