1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scilla [17]
3 years ago
5

Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current

programming languages and techniques. One of the languages that Kelley is learning is ____, an object-oriented programming language that is commonly used to write Web applications.
a. C
b. Java
c. Visual Basic
d. Scheme
Computers and Technology
1 answer:
Nonamiya [84]3 years ago
7 0

Answer:

The correct answer for the given question is an option(b) i.e java.

Explanation:

Java is an object oriented programming language that is mostly used for the creating the websites.Java is most secure and reliable programming language than the other programming language.

C is a programming language but it is not object oriented programming language thats why this option is incorrect.

Visual basic is a Programming language it is also used to create a web page but it is not commonly used to create a web page  thats why this option is incorrect.

The scheme is not used to create a web page  thats why this option is also incorrect.

You might be interested in
Create a function named first_a that uses a list comprehension. The function will take a single integer parameter n. Find every
aivan3 [116]

Answer:

def first_a(n):

   lst1 =[x for x in range(1,n+1)if x%6==0 or x%11 ==0]

   print(lst1)

Explanation:

Above is a function in python programming language. We have used list comprehension to check numbers that are multiples of 6 or 11 in a range.

When this function is called it will receive an argument (n) of type integer, a range will then be generated from 1 to n+1 since n is inclusive. The modulo operator is used to determine is a value is a multiple of 6 or 11, since their multiples will evaluate to 0

3 0
3 years ago
Which of the following kinds of computing refers to an environment of servers that house and provide access to resources users a
AveGali [126]

Answer:

Cloud is the correct answer for the above question.

Explanation:

Missing Information:

    The option is missing in the question and the question suggests to choice. The option can be liberated, cloud, disperse, digital for this question in which cloud is the correct answer.

Detailed Explanation:

  • The cloud is used to store a large amount of data or information for varies users and anyone can store or modify or delete the information from anywhere.
  • This service takes money from the user and gives service to modify, edit or add the data from anywhere using the internet. When a user wants to take the service of the cloud then he needs to contact the cloud service provider, then pays money to them and then he can enjoy the service.
  • The above question wants to ask about the term which is a vast environment of databases that provide access to the users to store and mane the data and that is the cloud which is the correct answer for the above question.
7 0
3 years ago
Server farms such as Google and Yahoo! provide enough compute capacity for the highest request rate of the day. Imagine that mos
EleoNora [17]

Answer:

a) Power saving = 26.7%

b) power saving = 48%

c) Power saving = 61%

d) Power saving = 25.3%

Explanation:

3 0
3 years ago
Which option allows you to customize the order of your data ?
Vladimir [108]

✧・゚: *✧・゚:*    *:・゚✧*:・゚✧

                  Hello!

✧・゚: *✧・゚:*    *:・゚✧*:・゚✧

❖ The correct answer choice is B) sorting. When you sort, you can order your sheet however you'd like.

~ ʜᴏᴘᴇ ᴛʜɪꜱ ʜᴇʟᴘꜱ! :) ♡

~ ᴄʟᴏᴜᴛᴀɴꜱᴡᴇʀꜱ

8 0
3 years ago
Read 2 more answers
The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas
Rudiy27

Answer:

True

Explanation:

Computer security is basically divided into three main areas:

  1. Vulnerability/threat assessment and risk management refers to a process that requires the identification, quantification and ranking of a system's possible vulnerabilities.
  2. network intrusion detection and incident response refers to software that detects malicious activity or policy violations, and blocks them
  3. digital forensic investigation refers to the process of identifying, recovering and interpreting (or validating) electronic data.

Generally a single individual may specialize in one of these areas, that is why he/she may need help with the others.

8 0
3 years ago
Read 2 more answers
Other questions:
  • To set up a slide show you should do all of the following except ______.
    9·1 answer
  • Different between ocular and compound miscroscope
    13·1 answer
  • What does nntp stand for?
    12·2 answers
  • What is ment by creative middle way solution
    6·1 answer
  • What is the first computer ever made?????
    9·2 answers
  • A Layer 2 switch configuration places all its physical ports into VLAN 2. The IP addressing plan shows that address 172.16.2.250
    7·1 answer
  • In the space provided, analyze the pros and cons of becoming a member of an artistic guild. Your answer should be at least 150 w
    12·1 answer
  • Gimme Shelter Roofers maintains a file of past customers, including a customer number, name, address, date of job, and price of
    8·1 answer
  • An online bank wants you to create a program that shows prospective
    12·1 answer
  • Why is translator required?​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!