1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paraphin [41]
3 years ago
6

In this exercise, you are given a phrase and need to return that phrase in all capital letters.

Computers and Technology
1 answer:
Alex73 [517]3 years ago
3 0

Answer:

Answer is in my provided screenshot!

Explanation:

Luckily, Java has a built in function that takes a String and turn it into an upper-case variant. We can just call on that function and return the result.

You might be interested in
Under what circumstances are composite primary keys appropriate?
guajiro [1.7K]
A composite primary key<span> is a set of several primary </span>keys<span> that, together, uniquely identifies each record.</span>
Primary keys are used as identifiers of composite entities. In this case each primary key combination is allowed only once in the *:* relationship.
Other case where primary keys are used is as identifiers of weak entities, where the weak entity has a strong identifying relationship with the parent entity. 
8 0
4 years ago
????????????helpppp please
Luden [163]

Answer:

I lab u pre haha jok

ano ka gold

3 0
2 years ago
What is the purpose of the print area feature​
Otrada [13]

Answer: The Print Area function in Excel allows you to print part of a spreadsheet rather than the full sheet

Explanation:

3 0
3 years ago
An independent penetration testing company is invited to test a company's legacy banking application developed for Android phone
LenaWriter [7]

In the case above, the company can prevent this from happening in the public Internet through the Use certificate pinning.

<h3>Should a person use certificate pinning?</h3>

Mobile applications are known to be one that often make use of   certificate or also public key pinning so that they can be able to make sure that communications are secure.

Hence it is one that  is often implemented if  the developer of the application is said to be require to validate the remote host's identity or if operating in a harsh environment.

Hence, Certificate pinning hinders which certificates are considered valid for a any kind of website,  and as such, In the case above, the company can prevent this from happening in the public Internet through the Use certificate pinning.

Learn more about certificate from

brainly.com/question/1874937

#SPJ1

4 0
2 years ago
To create a formula in ___ you would first click in one of the cells. A.word b.excel c.facebook d.powerpoint
guajiro [1.7K]
The correct anwser is excel 
7 0
4 years ago
Other questions:
  • Jail and prison officials may generally limit inmate rights when the limitations serve
    13·2 answers
  • John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues.
    12·1 answer
  • What is safe mode?
    9·1 answer
  • What natural boundary separated british territory from louisiana?
    7·1 answer
  • Suppose you have one particular application that is trying to send data on the Internet but none of the data is making it to the
    15·2 answers
  • What are some good electronics that I can buy on Amazon?
    14·1 answer
  • Create the tables and appropriate constraints based on the following ER diagram. Use appropriate data types. Note that the size
    7·1 answer
  • Beyond adding equations, what else does the Insert Equation feature allow users to do?
    7·1 answer
  • The Advanced Properties sheet enables you to add which of the following?
    15·1 answer
  • Structured query language (sql) enables data analysts to _____ the information in a database.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!