1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Iteru [2.4K]
4 years ago
14

Edhesive 9.3

Computers and Technology
1 answer:
Wittaler [7]4 years ago
9 0

Explanation:

Question 1:

Ans: index

Index is a unique position to identify a particular value in an array.

Question 2:

Ans: Element

Element is the individual value present in the array. An array is used to store one or more element.

Question 3:

Ans: String

We can find from the question that the value is enclosed within "" (double quotes). So, the value added to the array is string. Any value that is enclosed within double quotes are termed as string.

Question 4:

Indexes are always int. Array index are never float. This is because, it represent the position.

Question 5:

The output will be 3. The reason is there are 3 values appended to the array "stuff" in the given piece of program.

Question 6:

The given code is an example of initializer list. Price is a list variable where the values are initialized.

You might be interested in
Among the web programming languages, css is used to define _____ of the web page
Slav-nsk [51]

CSS is used to define format the layout text styles, table sizes, and other aspects etc of Web pages

4 0
3 years ago
During slide show mode, hitting the B key will do which of these things?
tia_tia [17]

Answer:

move to the first page?

6 0
4 years ago
Read 2 more answers
Which security measure provides protection from IP spoofing?
anyanavicka [17]

Answer:

An SSL also provides protection from IP spoofing.

8 0
3 years ago
What is used in an ipv6 for local device to learn the layer 2 ethernet address of a device that is on a remote nonlocal vlan?
zavuch27 [327]
The devices in IPv6 only need to learn the Layer 2 Ethernet address of a neighbor that is directly connected, and only if they need to communicate with each other on that local network. If the device you are trying to connect to is remote, you will forward the packet to your default gateway’s Layer 2 address.
NDP (Neighbor Discovery Protocol) is used to learn local neighbors’ Layer 2 Ethernet addresses when needed.
ARP is an IPv4 method to learn a local device’s Layer 2 address.
The RIPng (RIP next generation) is RIP version that support of IPv6 networking..
3 0
3 years ago
​which type of cryptography provides the most security?
Doss [256]

Answer B: Asymmetric cryptography, because the receiver has its own decryption key and cannot create encrypted messages, because he doesn't have the encryption key.

About the other answers:

A: Private keys are always involved, there has to be some secret to do encryption, so this answer doesn't say very much.

C: Digital signatures can be used to verify/prove some data comes from some person (the signer) in an unaltered way. It is not about encryption, so is not about the security of your message. You use it in combination with encryption.

D: Like A, this doesn't say very much. Shared secret keys (symmetric keys) can be used for encryption, but they are less secure since the keys have to exist in more than one place (sender and receiver).



4 0
3 years ago
Other questions:
  • Where is the error in this code sequence?
    11·1 answer
  • Deterime the minimum number of multiplication operations needed to compute the following. Show the order of the computations.
    10·1 answer
  • On a pie chart, the different sections or "wedges" show:
    9·1 answer
  • How do you make Thumbnails and outros on Youtube for free?
    8·1 answer
  • 1. What is Computer Hardware?
    14·1 answer
  • How many bits long is a autonomous system number?
    13·1 answer
  • Julie is purchasing new shoes on a website for her favorite store. Which of the following would indicate that a website is a sec
    6·1 answer
  • 3. Comparing the Utopian and dystopian views of Technology according to Street (1992) which one in your view is more applicable
    9·1 answer
  • In the previous project, you are storing the first name of the gamer. Write a phrase to the game right before the first word wit
    6·1 answer
  • Please help me with these questions please
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!