1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
brilliants [131]
3 years ago
13

If str 1 and str2 are both Strings, which of the following expressions will correctly

Computers and Technology
1 answer:
Novosadov [1.4K]3 years ago
3 0
Str1==str2 is the answer
You might be interested in
Why does the position of drawCircle(x, y, r) in the answer choices matter?
Andrei [34K]

Answer:

B and C

Explanation:

xPos and yPos determine the center of the circle, and rad determines the radius of the circle drawn.

It cannot be A because it starts drawing a circle with the center of (4, 1). None of the circles ahve a center at (4, 1). It is B because while it does start at (4, 1), the repeat function adds one to the y and radius. While ti repeats 3 times it ends up drawing all 3 circles. C also works because it starts by drawing the biggest circle and then subtracting the values to make the other two. It cannot be D because in the repeat function it subtracts from the y value and radius too early, it doesn't draw the biggest circle.

6 0
1 year ago
An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the comp
adelina 88 [10]

Answer: Data and Insights

Explanation:

Data and Insights in an enterprise platform is very important as it helps users better understand their customers so that they may be able to offer them the best services.

Data allows the platform to capture the data of the customer and insights then curates and consumes the data for analysis. The result of this analysis will enable the company to better understand the customer so that they might be able to offer preferable products.

3 0
2 years ago
Consider a relation BOOKS that holds information about the inventory of books (used or new) in a bookstore with attributes (titl
Yuri [45]

Answer:

See explaination

Explanation:

Somehing is considered functional dependent (FD) if a relationship between two attributes, typically between the PK and other non-key attributes within a table. For any relation R, attribute Y is functionally dependent on attribute X (usually the PK), if for every valid instance of X, that value of X uniquely determines the value of Y.

Please kindly check attachment for the other details.

5 0
3 years ago
Which is an aspect of structural level design?
natita [175]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

          "structural level design"

Structural engineer is a sub discipline of civil engineer are strained to design the bones and muscles that create the form and shape of man made structures.Structural engineer needs to understand and calculate the stability,strength and rigidity and earthquake of built structure of building and non building structures.The structural of other design are integrated with those of other designers such are architecture and building services engineer and often supervise the construction of projects by contractors on site.They can also be involved in the design of machinery,medical equipment,and vehicle where structural integrity affects functioning and safety.

Structural engineering theory is based upon applied physical law and empirical knowledge of the structural performance of differents materials and geometrics.Structural engineer engineer are responsible for making creative and efficient use of funds,structural elements and materials to achieve these goals.

7 0
3 years ago
A digital certificate confirms that the macro created by the signer has not been altered since the digital certificate was creat
Nesterboy [21]

Answer: False

Explanation:

Digital certificate is defined as entity identification in digital form that is used by a user or firms to share their information along with authentication and security. It uses public key cryptographic technique and so it is also know as public key certificate.

  • Digital signature is the signature that is done digitally to secure data or document.It maintains security of the content present  in message of information that is being exchanged through e-signature.It follows encryption technique for maintaining authenticity.
  • Therefore, digital signature is the signing feature that protects macro after being made to maintain its authenticity.
  • Thus, the given statement is false.
3 0
2 years ago
Other questions:
  • It is not recommended by the USA EPA, but adding refrigerant to a leaking A/C system is
    13·1 answer
  • When did internet came to existence?
    12·1 answer
  • Td udutdiydiyfyfigciydutdutdtt
    10·2 answers
  • Where is the worlds biggest cookie​
    7·2 answers
  • Write a program that displays a menu allowing the user to select air water, or steel. After the user has made a selection, the n
    10·1 answer
  • A technique for identifying and tracking assets using technologies such as RFID and smart cards is known as electronic tagging.
    6·1 answer
  • E-What is the important of Recycle bin?<br>Ans:​
    12·1 answer
  • Will give brainliest!!!!!!!!
    15·2 answers
  • Que ventajas podria traer el internet a la educacion artistica? Ayuda porfa telo pido porfavor
    13·1 answer
  • rue or false: The first web browser was introduced to the public in the 1970s and started the explosive growth of the Internet i
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!