1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marin [14]
3 years ago
8

I have an IPhone 8plus 64gb... should I get another phone like samsung note 9 or s9 ??

Computers and Technology
1 answer:
laiz [17]3 years ago
7 0

Nah, I think the IPhone would be better than them both


You might be interested in
What makes Group Policy such a powerful tool is its ability to enable security administrators to:_________.
babunello [35]

Answer: Enforce the organization's security policy

Explanation: Group policy provides a robust and centralized control to systems or computers on a particular network by providing a quick and efficient means of maintaining network security by affording network administrators the ability to several policies they wish to apply on users and computers in their network. This way the changes or policies can be applied to every computer on it's network. Hence it allows the network administrators to enforce the organization's security policy which may include restricting access to certain websites, directories, files or settings for all computers on the organization's network.

5 0
3 years ago
The most effective technique of malware propagation among the following list
iVinArrow [24]

Question Completion with Options:

A. Embedding & packing malcode in application programs

B. Replacing the Import-Address-Table (IAT)

C. Appending & prepending malcode into application programs

D. Embedding malcode in documents, such as MS O Office & PDF

Ε. Replicating malcode's source code

Answer:

The most effective technique of malware propagation among the following list is:

A. Embedding & packing malcode in application program

Explanation:

Malware propagation becomes effective and replicates effortlessly when malicious codes (otherwise called malcodes, which are self-replicating malicious programs) are embedded and packed in application programs.  These usually take many years before they start to manifest, making them very difficult to detect.  They are often triggered by some set events.  Given the nature of malcodes and the culprits behind them, they are very dangerous to applications and pose substantial business risks.

6 0
3 years ago
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other
Fantom [35]

Answer:

B. Use cross-platform tools to write code that will translate the existing Android app code into different native formats.

Explanation:

Cross-platform application development tools are tools that can be used tool generate applications of different platforms, by just writing a single type of code. It has the ability to automatically create an application of a different platform from another.

A developer can develop an application like Android and convert it to IOS for Apple. Xamarin, Appcelerator coroner etc, are all examples of cross-platform tools.

8 0
4 years ago
Write a function called count_occurrences that takes two strings. The second string should only be one character long. The funct
iVinArrow [24]

Answer:

Here is the Python function:

def count_occurrences (string1 , string2):  # method that takes two strings as parameter and returns how many times second string occurs in first

   count = 0  #counts number of occurrence of string2 in string1

   for word in string1:  #iterates through each word of the string1

       for character in word:  #iterates through each character of each word in string1

           if character == string2:  # checks if the character in string1 is equal to the character of string2

               count = count + 1  #adds 1 to the count of string2 in string1

   return count  #returns number of times the string2 occurs in string1

#in order to check the working of the function add the following lines to the code:    

first_str = input("Enter the first string: ")  #prompts user to enter first string

second_str = input("Enter the second string (one character long): ") #prompts user to enter second string which should be one character long

occurrence = count_occurrences(first_str,second_str)  #calls count_occurrences method by passing both strings to it

print(second_str,"occurs",occurrence,"times in",first_str) #prints how many times the second_str occurs in the first_str on output screen

Explanation:

The program is well explained in the comments added to each statement of the above code. I will explain the program with an example:

Suppose

string1 = "hello world"

string2 = 'l'

So the method count_occurrences() should return how many times l occurs in hello world.

count is used to count the number of occurrences of l in hello world. It is initialized to 0.

The first loop iterates through each word of string1. The first word of string1 is "hello"

The second loop iterates through each character/letter of each word. So the first letter of "hello" word is 'h'.

The if condition if character == string2: checks if the character is equal to string2 i.e. l.

character = "h"

string2 = "l"

The are not equal so the program moves to the next character of word hello which is e. The if condition again evaluates to false because e is not equal to l. So the program moves to the next character of word hello which is l.

This time the if condition evaluates to true because

character = "l"

string2 = "l"

character == string2

l == l

So the if part is executed which has the following statement:

count = count + 1

So the count is added to 1. count was 0 previously. Now

count = 1

Next the program moves to the next character of word hello which is l. This time the if condition evaluates to true because the character l matches with string2. So count is again incremented to 1. count = 2.

Next the program moves to the next character of word hello which is o. The if condition evaluates to false as o does not match with string2 i.e. l. So the count remains 2.

Next the first loop moves to the next word of the string1 = "world". The inner (second) for loop iterates through each character of "world" from "w" to "d" and checks if any character is equal to string2. Only one character is equal to string2 in "world". So count is incremented to 1. Hence count = 3

After the loop ends the statement return count returns the number of times string2 occurs in the string1. So the output is:

l occurs 3 times in hello world  

8 0
3 years ago
In Java, a char variable is capable of storing any Unicode character. Write a statement that assigns the Greek letter ^ to a cha
miv72 [106K]

Answer:

public class Main

{

public static void main(String[] args) {

    char greekLetter = '^';

    System.out.println(greekLetter);

}

}

Explanation:

Create a char variable called greekLetter and set it to the ^

Print the greekLetter to the screen

7 0
3 years ago
Other questions:
  • G=D+(A+C^2)*E/(D+B)^3 Rewrite the above formula in terms of doing concurrent processing using cobegin and coend to identify thos
    12·1 answer
  • To name a computed field, follow the computation with the word ____ and then the name you wish to assign to the field
    8·1 answer
  • What are personal skills? A manner of individual style How a person manages and expresses oneself One's ability to excel at spor
    13·2 answers
  • A URL suffix is called a domain name.
    11·1 answer
  • What component of Kerberos is responsible for storing keys for encrypting and decrypting data in the authentication process?
    13·1 answer
  • What is it called when two different files generate the same hashing result?
    15·1 answer
  • Please code this in c++
    10·1 answer
  • There is a renewed focus among today’s parents on providing food to their family.
    6·1 answer
  • when I turn on my pc using a graphics card, it does give video, and everything is normal, but when I try to turn on my pc with t
    8·1 answer
  • Which is government departments fund the Global Positioning System
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!