1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
9

What method of the String object searches the string for an occurence of the specified search string?

Computers and Technology
1 answer:
KATRIN_1 [288]3 years ago
3 0

Answer:

the indexOf() method

Explanation:

The indexOf() method in java returns the first occurrence of the of the string or a character specified in it.It can be used to search both a character or a string.

for example:-

import java.util.*;

import java.lang.*;

import java.io.*;

class indexOf

{

public static void main (String[] args)

{

    String s="IamNumber4";

    int l=s.indexOf("Num");//using indexOf() method on string object..

    System.out.println(l);

}

}

Output:-

3

You might be interested in
data is transmitted in plain text. this is a: group of answer choices brute force attack session hijacking dictionary attack cry
Anton [14]

The data that is transmitted in plain text is option D: cryptographic failure.

<h3>An established plain text only assault is what?</h3>

The known-plaintext attack (KPA) is a cryptanalysis assault type where the attacker has access to both the encrypted and plaintext versions of the data (also known as a crib) (ciphertext). These can be used to reveal additional hidden information, including code books and secret keys.

Therefore, Plaintext in the context of cryptography typically refers to unencrypted data that is being prepared for input into cryptographic techniques, typically encryption algorithms. Typically, unencrypted data transmission or storage falls under this category.

Learn more about data transmission from

brainly.com/question/10564419
#SPJ1

5 0
1 year ago
2) The CPU is made from a silicon<br>b) Chip<br>C) pendrive<br>a) Steel<br>​
Aleks [24]

Answer:

b

Explanation:

a cpu is made from silicon chip

5 0
3 years ago
What factors cause technology to progress
yKpoI14uk [10]

Explanation:

the higher demand of people

the urge to make the busy life easier

the competition between countries and people etc

5 0
3 years ago
Part 3:<br> Please answer
Levart [38]

Answer:

a) 4 processes

b) 2 resources

c) R1: 2 instances

   R2: 2 instances

d) R2

e) R1

f) R1

g) No resource

h)  R1

i) R2

j) R2

k) No

l)No deadlock

Explanation:

You need to know that the resources that are required by the processes for completion are shown by the request edge and the resources allocated are shown by the allocation edge. And thus, we can find what resources are allocated to the process, and required for the completion accordingly. And here again, the cycle is created, and hence deadlock may or may not occur. However, we see that resources have multiple instances and get freed on time. And hence, deadlock does not occur.

Like,

P4 uses R2 and free one instance of R2.

P3 then uses one instance of R2 and free R2.

P3 then uses one instance of R3 and free R3.

P1 uses one instance of R1 and free R1 one instance

P1 then uses R2 and free R2.

P2 uses R1 and free R1.

Hence, all the processes are complete and deadlock does not occur.

3 0
3 years ago
Give example of a biometric authentication device​
seropon [69]

Finger Print Scanner, Spit Sample, Face ID

7 0
4 years ago
Other questions:
  • When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihoo
    5·1 answer
  • There is no way to track your smartphone once you lost it, true or false?
    15·2 answers
  • What is the role of the osi application layer? provides control of all the data flowing between the source and destination devic
    5·1 answer
  • How do headphones work? (From pc)
    8·1 answer
  • Select the images that are isometric drawings
    11·1 answer
  • Match each with the correct answer.
    7·1 answer
  • (TCO B) The symbol shown as a three-sided box that is connected to the step it references by a dashed line is what?
    11·1 answer
  • Discuss one simple example of hybrid computer.​
    15·1 answer
  • What is the output by the code system.out.print(8-4+2);
    13·1 answer
  • How to send an email to multiple recipients individually.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!