1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ki77a [65]
3 years ago
5

When you declare a string data type, you are actually creating an object from the?

Computers and Technology
1 answer:
aleksandrvk [35]3 years ago
5 0
<span>from the string class</span>
You might be interested in
The elements in a long array of integers are roughly sorted in decreasing order. No more than 5 percent of the elements are out
USPshnik [31]

Question Completion with Options:

a. Ill only.

b. I only.

c. II and III only.

d. I and II only.

e. Il only

f. I and Ill only.

Answer:

The best method to use to sort the array in descending order is:

e. Il only

Explanation:

The Merge Sort is similar to the Insertion Sort but, it is better with its sorting versatility.  It repeatedly breaks down a list into several sub-lists until each sub-list consists of a single element and then, merging the sub-lists in a manner that results in a sorted list.  The Merge Sort has been described as a "divide and conquer" technique because of how it splits a list into equal halves before combining them into a sorted whole.

8 0
3 years ago
Which protocol is often used to publish web pages to a web server?
zmey [24]
 File Transfer Protocol, also known as FTP
5 0
3 years ago
The sender side of rdt3.0 simply ignores (that is, takes no action on) all received packets that are either in error or have the
Rom4ik [11]

Answer:

It might not work efficiently.

Explanation:

The function of the protocol rtd3.0 is to transfer data to a receiver from a sender.

As soon as the receiver received the packet transferred by the sender, we respond acknowledge (Ack) to the sender so that sender can confirm the receiver has gotten it.  

The receiver will not send any acknowledgment if the packet he receives are such that bits contain error or not in order.

After that timeout, the packet will be re-transmitted by the sender.

It is then possible the protocol might seem to be inefficient if a packet is sent many times, because other packets will have to wait to sent until the current packet is sent successfully.

The solution to prevent this kind of issue is to allow for the occurrence of premature timeouts.

7 0
3 years ago
How will you configure those computer hardware peripherals​
almond37 [142]

Answer:

i dont

Explanation:

know sorry tenks thankyou

8 0
2 years ago
Can you determine if an external web site was likely accessed from a computer in you department a couple of seconds ago?
fredd [130]

Answer:

Yes, it can be determined if an an external web site was likely accessed from a computer in the same department a couple of seconds ago.

Explanation:

Yes. “Dig” can be used to search that website in the local DNS server. A practical example would be to insert “dig google.com” and that will give us the result of the query time for searching and finding google.com. Supposing google.com was accessed a few seconds ago, then an entry for google.com is cached in the local DNS cache and the search or query time is 0 msec. If not the query time will be large.

3 0
3 years ago
Other questions:
  • What is telepresence
    8·1 answer
  • You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you r
    9·1 answer
  • What does the "e" in eSATA stand for?
    13·2 answers
  • Which of the following is NOT a view which can be chosen for a presentation?
    15·1 answer
  • Being aware of and understanding why potential buyers on a web site do not complete their purchases requires the expertise of __
    11·2 answers
  • By default, the Windows desktop displays
    6·1 answer
  • With the Linux operating system, its open source design means it can be used, modified and ______
    10·1 answer
  • write ms-dos command to list all the files and folders of EIGHT sub directory of C: drive in ascending order according to file n
    5·1 answer
  • The _____ feature enables you to represent text as colorful visuals.
    15·1 answer
  • Computer networks that use packet switching are less efficient than telephone networks that use circuit switching.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!