1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mezya [45]
3 years ago
12

A java ____ is a program written in the java programming language, could execute and consume a computer's resources.

Computers and Technology
1 answer:
stiks02 [169]3 years ago
7 0

Answer:

Applet is the correct to the given question .

Explanation:

The java applet is a program that is executed by the web browser .The java applet is the small program application that are run in the web browser .In the java applet program we can play the sound which is not done by the standalone application .

  • The java applet program is more secure then the standalone application because it will run in the network  and access the resources .
  • The java applet takes more computer's resources as compared to the  standalone application .
  • The user will used the <applet > tag to creating the applet file .
You might be interested in
What do you mean by algorithm​
Snowcat [4.5K]

A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

7 0
4 years ago
Read 2 more answers
Which vendor certification would you think is the most relevant in the field of IT security? Why?
Travka [436]

Answer:

Certified Ethical Hacker

Explanation:

To maintain the confidentiality and integrity of the data , information, etc Information Technology security is of utmost importance thus preventing the harms and losses of an organization.

Certified Ethical hacker abbreviated as CEH is most relevant in the IT security sector.

EC- Council offered CEH, an intermediate level vendor certification, a must have for the security of IT organizations and the ethical hacking professionals.

It gives a demonstration of the information on assessing a system's security, vulnerabilities of a system,etc.

It became inevitable for the It sector as it faced breeches of security worldwide in the year 2018.

CEH credentials have sound knowledge and are skilled in hacking practices in the fields like firewalls, evading IDs, cryptography, Trojan, denial-of-service attacks, system hacking,etc

3 0
3 years ago
PLEASE HELP!!!
BaLLatris [955]

leave (i'm pretty sure this is the answer)

3 0
3 years ago
Read 2 more answers
How to change my age on this app
RideAnS [48]
You can’t really change your age on this app. Once you submit you can’t really change it. I’m not sure why
6 0
3 years ago
Read 2 more answers
Write a program thattakes a number x and its exponent y from the user and thencalculate the result
miv72 [106K]

Answer:

#include<iostream>

using namespace std;

//main function program start from here

int main(){

   //initialize the variables

  int num, exponent;

   int result=1;

   //print the message on the screen

  cout<<"Please enter the number: ";

  cin>>num;  //store the user enter value

  cout<<"Please enter the exponent: "; //print the message on the screen

  cin>>exponent;//store the user enter value

   //take a while loop for calculating th power.

  while(exponent != 0){

   result = result*num;

  exponent--;

  }

  cout<<"Result is: "<<result<<endl;

}

Explanation:

Create the main function and declare the variable.

Then, display the message on the screen for the user and store the value enter by the user in the variables by using the instruction cin.

Take a while loop and it run until the value of exponent not equal to zero.

and then repeated multiply the number with the previous value which stores in the result.

for example;

the number is 2 and the exponent is 3. Initially, the result store is 1.

then, result = 1 * 2=2

exponent--, then exponent update the value 2.

again loop executes,

result = 2* 2=4

exponent--, then exponent update the value 1.

again loop executes,

result = 4* 2=8

exponent--, then exponent update the value 0.

The same process happens in our code and it run until the exponent not equal to zero. when it reaches zero, the loop will be terminated.

and finally, print the output.

4 0
4 years ago
Other questions:
  • When a user runs an application, what transfers from a storage device to memory?
    15·1 answer
  • Me2540 week 5 assignment<br> what do i want to know?
    9·1 answer
  • Lionel wants to find images of colonies of Emperor penguins to use for a school project. Which of the following phrases should h
    15·1 answer
  • The development team recently moved a new application into production for the accounting department. After this occurred, the Ch
    7·1 answer
  • Maureen downloads three pictures of cabin sizes for her siblings to vote on. She inserts one picture per slide. The third pictur
    10·1 answer
  • Which of the following is not a compilation error? Group of answer choices a. Placing a semicolon at the end of the first line o
    13·1 answer
  • What is the value of the variable named result after the following code executes? var X = 5; var Y = 3; var Z = 2; var result =
    14·1 answer
  • What are the purposes of using a text-to-speech tool? Check all that apply.
    9·2 answers
  • What are the five generations of computers?​
    13·1 answer
  • What is the accurate description
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!