1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
4 years ago
8

What is the output of this program?

Computers and Technology
1 answer:
Wewaii [24]4 years ago
5 0

Answer:

6 +4 + 6 +4

Explanation:

It will start from index 0 and wherever you find the character inside the indexOf methods then you will note it down.

You might be interested in
Jhon bought a new printer for his desktop computer. It does not work even though he checked all the cables and cords. What do yo
ExtremeBDS [4]
Im not for sure but it might be B or C
4 0
3 years ago
Read 2 more answers
modern managed cloud service providers will often use secure keyboard/video/mouse (kvm) devices within their data centers. these
professor190 [17]

A cloud service providers uses KVM in their data centers because they are gravely concerned with insider threats.

KVM is a system for management, monitoring and control of a data center environment from a central location. In the data center this system is very necessary because the data center has multiple servers and computers. With this system the server can be connected and controlled from a remote location. This includes mapping the physical locations of accessible virtual drives.

Your question is incomplete, but most probably you full question was:

Modern managed cloud service providers will often use secure Keyboard/Video/Mouse (KVM) devices within their data centers. these devices are extremely expensive compared to their non-secured counterparts. which of the following is one of the reasons cloud service providers do this?

  • They have plenty of revenue and can afford it
  • They are gravely concerned with insider threats
  • Cloud data centers need very few of these devices
  • Managed cloud providers often manufacture their own devices as well

Learn more about servers brainly.com/question/27960093

#SPJ4

7 0
1 year ago
There are built-in Styles to format your document and make changes to your document with just one click of a button.
Dmitriy789 [7]
False

i’m sure of it !!
6 0
3 years ago
Read 2 more answers
The major computer operations include what?
Goryan [66]

Answer:

The major computer operations include sequence and looping. ... Visual Basic, C++, and Java are all examples of computer programming languages.

7 0
3 years ago
1. Which of the following is not the name of a Java wrapper class from the Java API?
katovenus [111]

Answer:

1. Which of the following is not the name of a Java wrapper class from the Java API?

A. Byte

B. Int

C. Long

D. Boolean

Int is not a wrapper class  

Byte is the wrapper class of byte, Int is not a wrapper class and is a primitive data type, Long is a wrapper class of long, Boolean is a wrapper class for boolean. Hence Int is the correct answer and its wrapper class is Integer.

2. Which of the following statements will cause a compiler error?

A. Integer i = new integer ( ) ;

B. Integer j = new integer ("5") ;

C. Integer k = Integer.valueOf ("5");

D. int m = Integer.pareseInt ("5");

“I” in integer in A and B must be in capital.

3. If variables j and k refer to objects of type Double and j . compareTo (k) returns a value of 1, which of the following is true?

A. The double value held in j is less than the value held inside k.

B. The difference between values held in j and k is 1.

C. The double values held inside j and k are both positive.

D. The double value held inside j is greater than the value held inside k.

Compareto return 1 if first value is greater than with what it is compared.

4. What is a radix as used in the method parseInt (String s, int radix) from the integer class?

A. A numeric base 2 such as for binary or 16 for hexadecimal.

B. The number of characters in the string that represent integers.

C. The Unicode character code to be used when parsing the string.

D. The number of times the string should be repeated before being converted to an int.

The radix value is 10 for decimal, 2 for binary and 16 for hexadecimal. Radix is the base or number of unique digits.

5. Which of the following is a static method of the integer class?

A. intValue ( )

B. parseInt ( )

C. toString ( )

D. compareTo ( )

ParseInt() is a static method of the integer class, and rest are non static methods.

6. Which of the following statements will cause a compiler error?

A. Double a = new Double (10.6) + 3;

B. Integer b = 0;

C. Double c = 0;

D. int d = new Integer (7) ;

In A and C data type does not matches like Double c=0 means Double c=new int(0) which is never true.

7. Which of the following is not an example of autoboxing?

A. Boolean a = false

B. Integer b = new integer (9);

C. double x = 3.0;

Double c = x;

D. Character d = ‘2’;

Autoboxing brings out reference type from the value type, and this is not true for A  

8. What is the result of the following code fragment?

BigInteger a = new BigInteger (“10”);

BigInteger b = new BigInteger (“25”);

a . multiply (b);

a . add (b);

System.out.println (a);

A. 10

B. 35

C. 250

D. 275

a.multiply(b) = 250

a.add(b)= 250+25=275

9. What is the name of the BigInteger method that will calculate the remainder of division by another BigInteger?

A. modulo ( )

B. modulus ( )

C. divisor ( )

D. remainder ( )

Remainder is the correct answer.

Explanation:

Please check answer.

5 0
4 years ago
Other questions:
  • What feature did we use to quickly apply the formatting shown in this image?
    9·1 answer
  • What would you use to exit from a for each activity and continue the execution of the workflow?
    13·1 answer
  • The max-age attribute of a cookie is specified in
    13·1 answer
  • How do you enter the command prompt on Chromebook
    10·1 answer
  • What is the name of the popular DBMS (database management system) that is open source and is distributed under the General Publi
    15·1 answer
  • The computer has had far-reaching effects on our lives.how has the computer effected your life?
    8·1 answer
  • How is a source file different from a "listing file"?
    5·1 answer
  • What is the platform-neutral programming language that can run on Windows, Macintosh, or UNIX?
    15·1 answer
  • All websites with medical information should be considered credible.
    15·2 answers
  • What is the home page on a website?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!