1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
daser333 [38]
3 years ago
10

Woah my favorite character got arrested

Computers and Technology
2 answers:
andrew-mc [135]3 years ago
8 0

Not cool shaggy WHAT A SHAME TSK TSK TSK

olasank [31]3 years ago
4 0

Not sure how to answer this. But shaggy was quite amazing.

You might be interested in
Write a small program that takes in two numbers from the user. Using an if statement and an else statement, compare them and tel
kap26 [50]

What code is it java, HTML,C++ or lua?  be specific.

4 0
3 years ago
Read 2 more answers
When a network mask is applied to any ip address on the network, the result is the ip address' network part followed by zeros?
joja [24]
Yes.








-----------------------------------------------------------------------------------
4 0
4 years ago
For a string s ∈ {0, 1} let denote the number represented by in the binary * s2 s numeral system. For example 1110 in binary has
Bogdan [553]

4657879790989o689ok,vm vm  vjl478o78o7t8o78o8y;l. ,nmhnjser467iu56uy56uh by

7 0
3 years ago
In Java write a method called wordCount that accepts a String as its parameter and returns the number of words in the String. A
mamaluj [8]

Answer:

// here is code in java.

import java.util.*;

// class definition

class Main

{

   // method that return the number of words in the string

   public static int wordCount(String st)

   {

       /* split the string by space " " delimiter

       and save them into  string array*/

       String[] no_words=st.split(" ");

       // find the length of array

       int len= no_words.length;

       //return the length

       return len;

   }

   // driver function

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // scanner object to read input string

       Scanner s=new Scanner(System.in);

        // string variable

       String str;

       //ask user to enter string

       System.out.print("please enter the string: ");

       // read the string from user

       str=s.nextLine();

       // call the function with string parameter

      int tot_words= wordCount(str);

      // print the number of word in string

      System.out.println("total words in the string is : "+tot_words);

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read a string from user with the help of scanner class object.Call the function

wordCount() with string parameter.Here split the string by space " " delimiter.

Save the words into a string array.Find the length of the array and return it.

Then in the main print the number of words in the input string.

Output:

please enter the string: this string has wide spaces

total words in the string is : 5

5 0
4 years ago
How do network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS) differ?an NIDS focuses more
balandron [24]

Answer:

a. NIDS focuses more on analyzing incoming traffic, while an HIDS monitors valuable OS files

Explanation:

Intrusion detection system is used in analyzing, detecting, and raising alarm on suspicious network activities used by hackers to access unauthorized sites. Network intrusion detection system is meant to work in real-time, so as to analyze incoming traffic. Packets moving across the network are evaluated for threats.

Host intrusion detection system work within the operating system of the device to evaluate the history of system files that could contain threats, or unusual file permission changes, and then raise an alarm.

3 0
3 years ago
Other questions:
  • What are the advantages of a diverse workforce? Select all that apply.
    6·2 answers
  • 3. The invention of the transistor was important to the development of computers because it
    5·1 answer
  • The point of entry from a wireless device to a wired network is performed at a device called a(n) ____________________.
    10·1 answer
  • kieran wants to search a database quickly for information on the last time a patient came to his medical facility.The informatio
    14·2 answers
  • A ______ object is used for displaying the results of a question based on stored data.
    11·2 answers
  • 19. Fair use applies to which of the following situations?
    14·1 answer
  • Write one paragraph: Do you feel comfortable giving out personal information online? Why or why not? Is there a limit to what yo
    8·1 answer
  • Which can be used to enter and manipulate information in a database?<br><br> ANSWER: C) a form
    7·1 answer
  • Write the following abbreviations in full next to the question number
    15·1 answer
  • Printed versions of your presentation that contain the slides and blank lines below are called
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!