1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
4 years ago
5

A small java-based program is called a ________.

Computers and Technology
1 answer:
BabaBlast [244]4 years ago
5 0
<span>its called a Java Applet</span>
You might be interested in
Exposing employee and customer personal data to an untrusted environment is an example of:
jonny [76]

Answer:

data breach

Explanation:

A data breach is a security event in which a unauthorized person steals, copy, access or transfer personal or confidential data. A data breach is the deliberate or unintentional leak of sensitive data into an distrusted environment. When a perpetrator or cyber criminal effectively invades a data source and steals confidential information, a data breach happens. This can be achieved physically by manipulating a device or network to steal or hack local data. Data breach is being used to target companies mostly by remotely bypassing network security.Data breaches include financial and personal information, trade secrets of companies or intellectual property, files, confidential documents etc.

8 0
3 years ago
Dinah is using an I.D.E to write, modify, and save code. Which tool should she use?
iren [92.7K]
I th8nk she should use a source code editor.
3 0
3 years ago
Read 2 more answers
Gold jewellery is made when solid-gold is melted and then put into containers which are the shape of the jewellery. After this t
Scilla [17]

Answer:

B

Explanation:

Self Explanatory - It is melted into a liquid then poured into a mold. It cools and becomes solid.

5 0
3 years ago
A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in
Alexus [3.1K]

Answer: True

Explanation:

 Yes, the given statement is true that the DBA (Database administrator) utilize particular programming to store and arrange information.

The DBA is the proper understanding of the comprehension of the key business of an association, be capable in the utilization of chose database the executives frameworks, and remain side by side of developing advancements and new plan draws near.

The main purpose of the database administrator that it incorporate scope organization, establishment, setup, database plan, movement, execution checking, security, investigating, just as reinforcement and information recovery.

8 0
4 years ago
When the PT-109 American patrol boat, under the command of Lieutenant John F. Kennedy, was sunk by a Japanese destroyer, a messa
mr_godi [17]

Answer:

Meaning:

PT BOAT ONE OWE NINE LOST IN ACTION IN BLACKETT  

STRAIT TWO MILES SW MERESU COVE X CREW OF TWELVE  

X REQUEST ANY INFORMATION.

Explanation:

Playfair cipher  invented in 1854 by Charles Wheatstone was the first practical digraph substitution cipher. Lord Playfair promoted the use of the cipher, therefore it was named after him. Playfair cipher encrypts pairs of letters (digraphs) making it hard to break.  Frequency analysis can still be undertaken but requires much more cipher text in order to work. It requires no additional equipment to operate and is very fast therefore it is to protect information during war. It was used  by British forces in the Second Boer War and in World War I and during World War II by the Australians.  

When the PT-109 American patrol boat, under the command of Lieutenant John F. Kennedy, was sunk by a Japanese destroyer, a message was received at an Australian wireless station in the morning of the 2 of August 1943  in Playfair code:

KXJEY  UREBE  ZWEHE  WRYTU  HEYFS  

KREHE  GOYFI  WTTTU  OLKSY  CAJPO  

BOTEI  ZONTX  BYBWT  GONEY  CUZWR  

GDSON  SXBOU  YWRHE  BAAHY  USEDQ

Meaning:

PT BOAT ONE OWE NINE LOST IN ACTION IN BLACKETT  

STRAIT TWO MILES SW MERESU COVE X CREW OF TWELVE  

X REQUEST ANY INFORMATION.

5 0
3 years ago
Other questions:
  • B. Find Addition of Binary Numbers: 1100112 + 11012
    11·1 answer
  • Question / UJU
    11·1 answer
  • Explain how inflation flattens the universe
    6·2 answers
  • A word root is used to link a suffix that begins with a vowel. Which of the following words is an example of this rule? Group of
    6·1 answer
  • The actual database of Active Directory shared resources is stored on one or more computers designated as:
    6·1 answer
  • Define the missing method. use "this" to distinguish the local member from the parameter name.
    11·2 answers
  • Consider the following class declaration.
    6·1 answer
  • The space that helps you organize your PowerPoint or Web Page is called ______.
    13·1 answer
  • . Write the advantages and disadvantages of CLI?
    14·2 answers
  • What are the answers to these Python programs
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!