1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana [24]
3 years ago
15

________ returns the last character in a StringBuilder variable named strBuf? Select one: A. strBuf.charAt(strBuf.length() - 1)

B. StringBuilder.charAt(strBuf.length() - 1) C. StringBuilder.charAt(strBuf.capacity() - 1) D. strBuf.charAt(strBuf.capacity() - 1)
Computers and Technology
1 answer:
Lunna [17]3 years ago
4 0

Answer:

A

Explanation:

strBuf.charAt(strBuf.length() - 1)

You might be interested in
What tool is used to find and organize files on a mac
Margaret [11]

Answer:

the tool is literally called <u><em>The Finder.</em></u>

Explanation:

hope this helps

4 0
3 years ago
________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
Fynjy0 [20]

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

8 0
4 years ago
Características que debe tener un módulo o kit tecnológico para aprender​
12345 [234]

Answer:

Multi herramientas

Explanation:

Un kit tecnologico debe contener todas las herramientas necesarias para el trabajo que lo necesites, por ejemplo destornillador magnetico con varias puntas, herramientas para desmontar y por supuesto tener buena claridad para trabajar y alcohol isoprofilico de al menos 90+ para limpiar electronicos.

5 0
3 years ago
Which statement opens a text file so that you can retrieve the information it contains?
vesna_86 [32]

Answer:

Answered below

Explanation:

aFile = open("books.txt", "r")

This code uses the function open() which takes two parameters. The first parameter is the file name while the second parameter is the mode in which you are accessing the file.

The "r" mode opens the file in a reading state. That is, you can only read from the file. This code completes the reading process

aFile.read( )

The "w" mode opens the file so you can write to it and make changes.

The "a" mode opens the file so you can add contents to it.

3 0
3 years ago
In order to protect your computer from the newest virus, which of the following should you do after you've installed a virscan s
NNADVOKAT [17]
After installing your anti-virus, you must do the following to make sure that your computer will be virus free moving forward:

1. Scan every drive of your computer.
2. Scan every program, photo, video, etc before opening those.
3. Avoid visiting restricted sites.
4. Update your antivirus application. This way, the application gets new virus database.
5. Schedule antivirus scanning.
6. If your antivirus application do not have scheduled scanning, plan it.
7. Install antivirus widgets or extension in your web browser.
8. For maximum protection, you can install another antivirus application.
9. Uninstall risky applications.
10. Scan flashdrives before opening or exploing those. Avoid borrowing flashdrives.
11. Avoid inserting your flashdrives to other devices.
12. Defrag your system. Some virus can't be detected because your system's drive may be badly fragmented.

3 0
3 years ago
Other questions:
  • A book of the Law was found in the Temple, which was being repaired, during what year of Josiah's reign.
    15·2 answers
  • If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appr
    14·1 answer
  • If you glare and grit your teeth while telling your friend that you're not frustrated, your nonverbal communication is _________
    6·1 answer
  • How many address bits are needed to specify each byte in a 512 byte memory unit?
    5·1 answer
  • Write a program that prints the Grade based on the given data. 95-100: A+ 90-94: A 80-89: B+ 70-79: B 60-69: C+ 50-59: C &lt;49
    9·1 answer
  • A computer is unable to access the network. when you check the led lights near the computer's network port, you discover the lig
    6·1 answer
  • Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion
    8·1 answer
  • Hello help me with this please if you want to thank you I would give brainlist!
    13·2 answers
  • Fill in the blanks, so the print statement displays the result of the function call in order.
    12·1 answer
  • write a recursive bool valued function containsvowel that accepts a string and returns true if the string contains a vowel
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!