Answer:
a)
Explanation:
they are the same
What is the solution to the equation ?
1. Copy the file secret.txt (Code Listing 9.3) from the Student CD or as directed by your instructor. This file is only one line long. It contains 2 sentences. 2. Write a main method that will read the file secret.txt, separate it into word tokens. 3. You should process the tokens by taking the first letter of every fifth word, starting with the first word in the file. Convert these letters to uppercase and append them to a StringBuilder object to form a word which will be printed to the console to display the secret message.
Answer:
In Java:
import java.io.File;
import java.io.FileNotFoundException;
import java.util.Scanner;
public class FP {
public static void main(String[] args) {
try {
File myObj = new File("secret.txt");
Scanner scr= new Scanner(myObj);
while (scr.hasNextLine()) {
String data = scr.nextLine();
String[] tokens = data.split(" ");
for(int i =0;i<tokens.length;i+=5){
tokens[i] = tokens[i].substring(0, 1).toUpperCase() + tokens[i].substring(1); }
StringBuilder newstring = null;
newstring = new StringBuilder();
for(String abc:tokens){newstring.append(abc+" "); }
System.out.print(newstring); }
scr.close();
} catch(Exception ex){
System.out.println("An error occurred."); }
}
}
Explanation:
See attachment for complete program where comments were used to explain each line
A citation and its ____________________ can be entered at the same time. [Insert Citations]
Question 4 options:
name
date
source
table of contents
Answer: source
Explanation:
A citation and its source can be entered at the same time. Hence option c is correct.
What is citation?Citation is defined as how you disclose to your readers that a particular passage in your work was taken from another source. Identifying the sources you used to obtain your knowledge can demonstrate to the reader that you did thorough investigation. to recognize and respect other scholars' work by giving them due credit.
Select the phrase or sentence you wish to cite by clicking at the end of it, and then select Insert Citations from the Citations & Bibliography group on the References tab. Choose the citation you want to use from the list provided under "Insert Citation."
Thus, a citation and its source can be entered at the same time. Hence option c is correct.
To learn more about citation, refer to the link below:
https://brainly.com/question/1272936
#SPJ2
write Python statement to do the following tasks (a) create a list that contain the name of 5 student of your class (b) add one more name to the list of 5 students (c)
delete the first name from the list of student
Answer:
classroster = ["Bill", "Tyler", "Jake", "Sam", "Joe"]
print("Original Roster: " + str(classroster))
classroster.append("June")
print("Added student: " + str(classroster))
classroster.pop(0)
print("Removed the first student" + str(classroster))
Explanation:
We create a variable named classroster and assign it a list value by using []
We print text with the value of the variable classroster, but we used the str tag to make it a string value
We used classroster.append to add "June" to the end of the list.
We then print the classroster again
We use classroster.pop(0) to remove "Bill" on the list. If we wanted to remove "Tyler" from the list, we would use classroster.pop(1).
If we wanted to remove "Jake" we would use classroster.pop(2)
and so on. goodluck!
Identify what a computer needs to
communicate sound:
Driver
Digital sound
Mouse
Keyboard
DONE
Answer:
A B
Explanation:
I got it right
How does setting user permissions increase the security of a system?
Answer: This can allow for less hackers to acquire your most essential and private information. It will be kept private to you and only others you share with.
Explanation: For example, if I wanted to edit a document without being given the consent to do so this will breach the security of user permissions, but if the individual was to set the document to view only, I would not have access to edit or even change little aspects of it.
Jennifer has written a short story for children. What should be her last step before she submits the story for publication?
Answer: proofreading
Explanation:
The options include:
A. proofreading
B) editing
C) accepting track changes
D) rejecting track changes
Jennifer's last step before she submits the story for publication should be proofreading. Proofreading simply refers to the checking of errors in an article, story or text before such article or text is published.
Proofreading is the final stage when one is writing before it's published. When a story is proofread, spelling, formatting issues, punctuation marks and every other mistakes are checked and removed.
What is one example of an emerging class of software
Answer:
"Push" Model web browsers.
Explanation:
There’s a saying in Hollywood that a film is written three times.
First in the __________.
Next, in __________.
And finally, in __________.
Answer: first in the screen play next in production and finally in the edit
Explanation:
The ________________________ option allows one to start a numbered list on any number desired. [Set Starting Number Values]
Question 7 options:
Number Formats
Change List Level
Define New Number Format
Set Numbering Value
Answer:
Set Numbering Value.
Explanation:
Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.
In Microsoft Word 2019, the users are availed with the ability to edit the word document in the following view type;
I. View Mode.
II. Print Mode.
III. Drift Layout.
A numbered list can be defined as a list of items that are ordered numerically or sorted sequentially.
Basically, it is best suited for steps or procedures that are to be done sequentially or in order i.e in an ascending order. Thus, a numbered list is an ordered list that starts from 1.
The Set Numbering Value option allows one to start a numbered list on any number desired. To automatically create a numbered list in Microsoft Word, you should press 1 followed by a period, leave a space, type a text and then press the enter button.
two ways in which some culter views that exist may affect a relationship negatively
Answer:
some people say different culture less they get along
Explanation: or more
Citations that are ______________________________ can be used to build a bibliography when needed. [Create and Modify Citation Sources]
Question 1 options:
underlined
bolded
marked
italics
Answer:
I think the best option would be C. Marked
Explanation:
hope this helps and sorry if it is incorrect.
is an evaluation method that uses a program that tests another program.
O A customer satisfaction survey
O A test case
O Automated testing
O Print debugging
Answer:
automated testing
Explanation:
got it right on edge
Please help! Answers that do not relate to this topic will be REPORTED!
A. What do input and output have in common?
1. the characteristic of being modal
2. the ability to be either relative or absolute
3. unidirectional flow of data and sequential access
B. Which of these is NOT a level at which reading and writing of data can take place?
1. characters
2. bytes
3. paths
4. fields
C. If a program closes abnormally, where may information be retained?
1. in a buffer
2. in a socket
3. in a modal window
D. Fill in the blank with the correct response.
If one is reading and writing objects to a file, one is making use of ______, which is a simplified process in Java.
Answer:
answer for number A is
2. the ability to be either relative or absolute
B. 2 bytes
C. in a buffer
Explanation:
In the current situation, how do you access information as a student? How will you integrate the use of ICT in your daily life and your chosen track?
Answer:
Explanation:
As a computer science student information is accessed in every possible way. This can be through a local school lan network, mobile devices, e-mail, etc. All of these help information flow to and from various people and makes obtaining this information incredibly simple as a student. Especially in the field of computer science, I need to integrate as many ICT devices with me in my everyday life, to send emails, check calendar updates, research information on the web, check school reports, and even speak with clients.
How do you open an application on the macOS?
Click the Launchpad icon in the Dock, or pinch closed with your thumb and three fingers on your trackpad. Then click an app to open it. You can also type an app's name to find the app in Launchpad, then press the Return key to open it.
Answer:
you can simply click on 'application' in the sidebar to open your default application folder, which contain for each app on your system.you can double click any of the icons in here to open them or take you to do it if currently open.
who plays oblox .............................
Answer:
Me
Explanation:
Which of the following algorithmic efficiencies would be considered LEAST efficient?
A. Linear
B. Constant
C. Polynomial
D. Exponential
Answer:exponential
Explanation: I believe
Predict the future that social media will have on society or the environment.
Answer:
Social networks are becoming more and more popular. More than 80% of the 4.66 billion people on the planet with access to the internet are social network users… and this share is expected to grow!
Society will drift to technology and rely on it more.
Environment wouldn't be taken cared of, and may be damaged.
Explanation:
Answer:
The Influence of Social media is being used in ways that shape politics, business, world culture, education, careers, innovation, and more.
Explanation:
The Influence of Social media is being used in ways that shape politics, business, world culture, education, careers, innovation, and more.
it is a JavaScript property used to call a function after a specified time, in milliseconds
Answer:
setTimeout is a native JavaScript function (although it can be used with a library such as jQuery, as we'll see later on), which calls a function or executes a code snippet after a specified delay (in milliseconds).
Answer:
setTimeout is a native JavaScript function (although it can be used with a library such as jQuery, as we'll see later on), which calls a function or executes a code snippet after a specified delay (in milliseconds).
what is two features of the minicomputer?
Answer:
It is smaller in size than a mainframe computer. It is less expensive than a super and mainframe computer. It is not much more powerful than the mainframe and supercomputer, but powerful than microcomputers. It supports multiprocessing and multi-tasking.
Explanation:
why auto-updates can reduce the risk of a cyberattack?
Answer:
They help keep your software up to date.
Explanation:
Using Windows for example: With automatic updates, you don't have to search for updates online or worry about missing critical fixes or device drivers for your PC.
You can read more about it here: https://support.microsoft.com/en-us/windows/windows-update-faq-8a903416-6f45-0718-f5c7-375e92dddeb2
I hope this helps you!
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID for access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with a user name of admin and a password of admin. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device
Answer:
The answer is "Use SCP to back up the router configuration to a remote location".
Explanation:
In the SPC, it is the Secure Copy Protocol that allows information to be stored and securely transmitted. Its SCP doesn't encrypt its digital information by itself; it corresponds to both the Security module which provides authentication or security. It allows the safe transfer of personal documents from either a host machine to a remote server. Its transference protocol "FTP" is quite close, but it adds security and authentication.
QUESTION 4 of 10: What term refers to the basic characteristics of a population segment, such as gender, age, and income?
Your program has a two-dimensional array, scores. You are implementing your array with lists. Each member in the array is a pair of
scores, composed of [your team score, the opponent's score).
Which line of code will add a new pair of scores to the array?
scores.insert(6,2)
O scores.append([6.2])
O scores.insert[62]
O scores.append(6,2)
Answer:
scores.append([6, 2])
Or simply D
Explanation:
Note: Be sure to look carefully or you'll get tripped up. Trust me, I know!
What percentage of STEM-related degrees awarded in the 2002-2003 academic year were doctorates?
16.7 percent
0 34.8 percent
O 14.6 percent
O 12.9 percent
Answer:
34.8
Explanation:
I just took the test!
Sergio knows that to meet the project requirements, it is essential to have
Answer:
I need a better explanation??
By default, tables are sorted in ascending order by this.
What’s the answer?
Answer:
Record number
Explanation:
It simply can't be "data type" as there cant be more than one data type in a field. It won't be "primary key field" either as primary keys only set the field as unique. You can test this by changing the primary key to a different field. But for simplicity's sake, I did this experiment for you.
As you can see in the first and second attachments, ID is the primary key, set default by the program.
But when I set Field 8 as the primary key, shown in the third attachment, field 8 doesn't sort, shown in the fourth attachment.
Answer:
By default, tables are sorted in ascending order by record number.
Need answer quick plz.
Fill in the blank with the correct response.
A colleague excitedly tells you she has created a interface component for SPSS, a statistics software program. She
has created a
Answer:
SPSS
IS THE ANSWER
IHOPEIT WILL HELP YOU
Answer:
wassup with it bro i don't even know the answer and i just want the points
Explanation:
It is best to use ____________________ styles to get a table of contents to build easily. [Insert a Table of Contents]
Question 5 options:
font
pretty
heading
black
Answer: heading
Explanation:
It is best to use the heading styles to get a table of contents to build easily. In this case, when the table of contents us inserted, a section will be created for each heading.
When one applies the heading style, one is simply telling Ms Word that a new section in the document is about to begin. The heading style when used for the chapters can be used to know the number of sections that are contained in a document.