1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paraphin [41]
3 years ago
6

In this exercise, you are given a phrase and need to return that phrase in all capital letters.

Computers and Technology
1 answer:
Alex73 [517]3 years ago
3 0

Answer:

Answer is in my provided screenshot!

Explanation:

Luckily, Java has a built in function that takes a String and turn it into an upper-case variant. We can just call on that function and return the result.

You might be interested in
Simplify (6x+6)+(-3-4x) please hurry!!!!!
Ilia_Sergeevich [38]

Answer:

2x + 3

Explanation:

8 0
3 years ago
. Html documents are created by adding what to text?
zvonat [6]
The answer is Tags, sorry about putting the other answer misread question.
7 0
3 years ago
given that play_list has been defined to be a list, write an expression that evaluates to a new list containing the elements at
Tamiku [17]

Answer:

new_list = play_list[0:4]

Explanation:

5 0
3 years ago
From an intraindividual perspective, the causes of aggression in intimate relationships:____________.
OLEGan [10]

Answer:

How partners in a relationship differ in a way that would cause them to contribute differently to the aggression that occurs between them.

Explanation:

Aggression in an intimate relationship is a negative response to environmental stimuli of individual. Two types of aggression are unilateral and bilateral aggression.

Aggression in a relationship can be view from different perspective, namely, interpersonal perspective, intra-individual perspective and sociocultural perspective.

3 0
3 years ago
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that
Korvikt [17]

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

5 0
3 years ago
Other questions:
  • What are some situations where you might find it useful to use the “!” symbol in a program?
    9·1 answer
  • There are how many GPS satellites orbiting the earth
    15·1 answer
  • In web developing, what are the differences between front-end developer, back-end developer and full stuck developer?
    8·1 answer
  • What is the capacity of a disk with two platters, 10,000 cylinders, an average of 400 sectors per track, and 512 bytes per secto
    9·1 answer
  • Which of the following is a valid c++ identifier a. mouse b. _int c. 2_stop d. float​
    10·1 answer
  • How is geeking out related to the concept of social capital?
    5·1 answer
  • Project introduction​
    14·1 answer
  • What is HTML? Write some future of HTML.<br>follow for follow ​
    15·2 answers
  • You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications ar
    10·1 answer
  • To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!