1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisov135 [29]
3 years ago
14

Which of the following languages does not provide built-in-pattern matching operations (the language, although, has pattern matc

hing capabilities included in its class libraries)?
a) Perl

b)PHP

c)JavaScript

d)Java
Computers and Technology
1 answer:
Savatey [412]3 years ago
3 0

Answer: (D) Java

Explanation:

 In the programming language, the pattern matching is the process checking the specific sequence of the information and data and also locating the sequence among the raw data and sequence of the token in the system.

Java programming language does not provide any built in operation pattern matching. Java provide the different types of logical operations for accessing the functions in its class library. The pattern matching mainly include the location of the output pattern which substitute the matching pattern in the system.

You might be interested in
Pick 2 different operating systems and discuss how they can be used in daily operations.
Scilla [17]

Two different Operating Systems are

Windows 7

LINUX

Explanation:

  • Windows is an Operating System which was released by Microsoft to be used on Personal Computers.
  • They are used to manage software and perform various tasks.
  • LINUX is another type of operating system that is used on Super computers
  • Linux has been used in homes and organisation desktops in a great number.
  • It is used for great number of computing embedded tasks.
6 0
3 years ago
Machine-to-machine (M2M) technology enables sensor-embedded products to share reliable real-time data ________.Select one:a. ove
just olya [345]

Answer:b)via radio signals

Explanation: Machine-to-machine technology is the technology that helps in sharing of the real time information of the device that have embedded sensor.They can work without the help of the manual factors.

The data is shared through the help of the radio signals in the devices like turbines vending machines etc for the tracking purpose and managing.

Thus the other options are incorrect because short distance is a disttance, cloud services are for the collection of services and databases contains the data. So, the correct option is option (b).

5 0
3 years ago
The BaseballPlayer class stores the number of hits and the number of at-bats a player has. You will complete this class by writi
atroni [7]

Answer:

class BaseballPlayer {

 private int hits;

 private int atBats;

 private String name;

 public BaseballPlayer(String n,int h,int a) {

   name=n;

   hits=h;

   atBats=a;

 }

 public void printBattingAverage() {

   double battingAverage = hits / (double)atBats;

   System.out.println(battingAverage);

 }

 public String toString() {

   return name + ": "+hits+"/"+atBats;

 }

}

public class Baseballtester{

 public static void main(String[] args){

   BaseballPlayer babeRuth = new BaseballPlayer("Babe Ruth", 2873, 8399);

   System.out.println(babeRuth);

   babeRuth.printBattlingAverage();

 }

}

Explanation:

The BaseballPlayer class is used to get and hold data of an instance of a baseball player. the instance object holds the name, number of hits and bats of the player.

The constructor is used to initialize the name, hits and atBats variables of an instance. The "printBattlingAverage" method returns the ratio of the hits and atBat variable while the string method "toString" returns the name and the hits to atBats ratio in string format.

7 0
3 years ago
Write a public static method called getPIDs that has a parameter of type Map called nameToPID (keys are student names and values
Rasek [7]

Answer:

Java program is explained below

Explanation:

import java.util.HashSet;

import java.util.Map;

import java.util.TreeMap;

public class TruckRace1 {

   public static HashSet<String> getPIDs (Map<String,String>nameToPID ){

       HashSet<String> pidSet = new HashSet<>();

       for(String ids: nameToPID.values()){

           pidSet.add(ids);

       }

       return pidSet;

   }

   public static void main(String[] args) {

       Map<String,String> pids = new TreeMap<>();

       pids.put("John","123");

       pids.put("Jason","124");

       pids.put("Peter","125");

       pids.put("Alice","126");

       pids.put("Peny","129");

       HashSet<String> ids = getPIDs(pids);

       for(String id:ids){

           System.out.println(id);

       }

   }

}

4 0
3 years ago
Consider the following language:
VMariaS [17]

L is a decidable language because the Turing machine accepts it.

L is a recognizable language if  TM M recognizes it.

<h3>How do you know if a language is decidable?</h3>

A language is said to be decidable only when there seems to exists a Turing machine that is said to accepts it,

Here, it tends to halts on all inputs, and then it answers "Yes" on words that is seen in the language and says "No" on words that are not found in the language. The same scenario applies to recognizable language.

So,  L is a decidable language because the Turing machine accepts it.

L is a recognizable language if  TM M recognizes it.

Learn more about programming language from

brainly.com/question/16936315

#SPJ1

8 0
2 years ago
Other questions:
  • Which files track internet usage and personal information when people visit websites?
    14·2 answers
  • Which of these statements about cell references is NOT true?
    10·2 answers
  • ___________is a security strategy that applies multiple layers of defense because there is an assumption that any single protect
    12·1 answer
  • The computer component that makes sure that instructions are decoded and executed properly is the ___________.
    11·2 answers
  • Which of the following would be an example of a loss of record integrity in a
    12·1 answer
  • Most computer attacks are designed to steal information or money. Which of the following attacks is designed to slow down or sto
    14·1 answer
  • Gap junctions and plasmodesmata have what feature in common?
    6·1 answer
  • Which area of study involves microeconomWhich area of study involves microeconomics? A. a nation's ability to meet consumer dema
    10·1 answer
  • Synapse is not working and is crashing every time you attach it. What should you do?
    13·1 answer
  • What is the advantage of entering metadata for electronic records that you create
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!