1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksklad [387]
3 years ago
14

Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current

programming languages and techniques. One of the languages that Kelley is learning is ____, an object-oriented programming language that is commonly used to write Web applications.
a.C
b.Visual Basic
c.Java
d.Scheme
Computers and Technology
1 answer:
zepelin [54]3 years ago
3 0

Answer:

Option(c) i.e  java is the correct answer for the given question.

Explanation:

Java is is a high level programming language which are used to create the web application .It is the object oriented programming language .They follow all the features of object oriented programming language.

As Kelly is interested to gaining exposure  so she is learning java which is object  oriented programming language and created Web applications.

  • C is not object  oriented programming language so this option(a) is incorrect .
  • Visual Basic not commonly used to create the web application they are mainly used for windows application they are outdated programming language so this option(b) is incorrect .
  • Scheme is not used for creating  web application so this option(d) is also incorrect .
You might be interested in
what type of clause must you always use with DEKETE or UPDATE to avoid inadvertently changing data elsewhere in the database​
Shkiper50 [21]

While you’re using the DELETE or UPDATE to change the data in any database like MySQL or ORACLE, the WHERE clause can be used to avoid inadvertently changing data everywhere.

<u>Explanation:</u>

The WHERE clause checks the condition and the changes mentioned by the DELETE or UPDATE command will be done if the condition is true. There are also other clauses like HAVING, IN which will have range either inclusive or exclusive.

It is also noted that in MySQL, there is a method called WorkBench which enables safe mode and doesn’t execute statements without the WHERE clause.

5 0
3 years ago
In this class, it is very common for your computer screen to look like this. What is this?​
Vsevolod [243]
Theres no Picture???
8 0
3 years ago
Which of the following hacker attacks against wireless networks are virtually undetectable?
Ede4ka [16]

Answer: A. passive attacks

Explanation:

Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.

A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.

Methods of carrying out passive attacks.

•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.

•Dumpster driving: Attackers or intruders search for information from discarded computers and

other gadgets, those information can help to attack a network.

7 0
3 years ago
Mation about which osi layers of connected cisco devices can be verified with the show cdp neighbors comm
fgiga [73]
The show CDP neighbor command operates at the Data link layer (Layer 2)

Cisco Discovery Protocol (CDP) is a proprietary Data Link Layer protocol developed by Cisco Systems. It is used to share information about other directly connected Cisco equipment, such as the operating system version and IP address.

6 0
3 years ago
Students can use eNotes to type notes directly on screen and
zalisa [80]
A. review or print them later
6 0
3 years ago
Read 2 more answers
Other questions:
  • If you come to a stumbling block and can't think of any more ideas, what could you do? select all that apply 2pts.
    11·2 answers
  • Which of the following is true? A)Checks and Debit Cards both withdraw money directly from a bank account. B)Checks are the most
    13·2 answers
  • he fundamental building block in every Hypertext Markup Language (HTML) document is the _____ tag, which marks a component in th
    7·1 answer
  • The purpose of a lockout tagout checklist is to​
    9·2 answers
  • What do developers do to support software products
    14·1 answer
  • Which of the following is a benefit, as well as a risk, associated with peer-to-peer networks?
    6·2 answers
  • Write a method printshampoolnstructions0, with int parameter numCycles, and void return type. If numCycles is less than 1, print
    8·1 answer
  • Can you be my friend plz
    9·1 answer
  • In order to personalize your desktop, you may click on: Start&gt;settings&gt;Personalization . . .
    9·1 answer
  • When you create a new database using --------- , the database includes prebuilt tables and forms which you can populate with dat
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!