1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adoni [48]
3 years ago
9

Servlet session and JSP session have different abilities.TrueFalse

Computers and Technology
1 answer:
nikitadnepr [17]3 years ago
6 0

Answer:

The answer to this question is False.

Explanation:

According to life cycle of a JSP it has to becomes a servlet in the end.So there is no difference between their session handling capacities because in the end they are same.So we conclude that answer to this question is False.

You might be interested in
Cyberstalking is an example of a:
babunello [35]

Answer:

A cyber crime

Explanation:

Cyberstalking is a type of cybercrime that uses the internet and technology to harass or stalk a person. It can be considered an extension of cyberbullying and in-person stalking.

7 0
2 years ago
Which country is Europe's largest Internet market, with Internet users growing at a rate of 10 percent annually?
pashok25 [27]

Answer:

Germany

Explanation:

6 0
3 years ago
Design a loop that asks the user to enter a number. The loop should iterate 10
yarga [219]

There are actually a couple of questions in here. I'll try to answer them in Python, which kind of looks like psuedocode already.

1. Design a loop that asks the user to enter a number. The loop should iterate 10 times and keep a running total of the numbers entered.

Here, we declare an empty array and ask for user input 10 times before printing a running total to the user's console.

<em>numbers = [] </em>

<em>for i in range(10): </em>

<em>    numbers.append(input("number: "))  </em>

<em>print(f"running total: { ', '.join(numbers) }")</em>

<em />

2. Design a program with a loop that lets the user enter a series of numbers. The user should enter -99 to signal the end of the series. After all the numbers have been entered, the program should display the largest and smallest numbers entered.

Here, we declare an empty array and ask for user input forever until the user types -99. Python makes it really easy to get the min/max of an array using built-in functions, but you could also loop through the numbers to find the smallest as well.

<em>numbers = [] </em>

<em>while True: </em>

<em>    n = int(input("number: ")) </em>

<em>    if n == -99:  </em>

<em>        break </em>

<em>    numbers.append(n) </em>

<em>print(f"largest number: { max(numbers) }")   </em>

<em>print(f"smallest number: { min(numbers) }")    </em>

<em />

4 0
3 years ago
Describe how data is transmitted using half-duplex serial data transmission.
maw [93]

Answer:

In half duplex mode, the signal is sent in both directions, but one at a time. In full duplex mode, the signal is sent in both directions at the same time. In simplex mode, only one device can transmit the signal. In half duplex mode, both devices can transmit the signal, but one at a time.

6 0
3 years ago
The section called Breaking Substitution Ciphers (p. 166) describes a "random substitution cipher," in which each letter of the
timofeeve [1]

Answer: Compared to a Caesar shift, the random substitution cipher offers many more possibilities, because the encryption is randomly chosen.

Explanation:

A Caesar Cipher is also a type of substitution cipher, but instead of doing it randomly, it shifts the alphabet by a certain number of characters. Therefore, the answer to decrypt the message is simply to figure out that number.

5 0
4 years ago
Other questions:
  • Create short names for the terms below based on the naming conventions rules.
    14·1 answer
  • 6. When should you return to the right lane after passing another car on the left?
    14·2 answers
  • 1. Perform the following Binary Additions 101101 + 10100 *
    13·2 answers
  • Overcoming the fundamental attribution error requires making an effort to shift an external attribution into an internal attribu
    15·2 answers
  • Why do generated backup scripts usually include backticks around names such as database names and column names?
    5·1 answer
  • Can anyone help me with getting bash ubuntu on windows setup?
    15·1 answer
  • What are the programs required to work in computer
    7·1 answer
  • Management is as old as human civilization. justify this statement​
    7·1 answer
  • How does the technology affect you daily living? Give situations where you use technology and how it helped you.​
    5·1 answer
  • 1.11 LAB: Data frames
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!