1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
4 years ago
13

The ____ method returns an integer that represents the location of the substring within the string.

Computers and Technology
1 answer:
enot [183]4 years ago
5 0

Insert Method

it is used to returns an integer that speaks to the area of the substring inside the string.

You might be interested in
What's the value of this Python expression? ((10 >= 5*2) and (10 <= 5*2))
elena-14-01-66 [18.8K]

Answer:

The Boolean value returned by that expression will be True

Explanation:

We have two logical statements in that expression:

Expression 1: (10 >= 5*2)

This can be read as: is 10 greater than or equal to 5 multipled by 2. This evaluates to true as 10 is equal to 5 * 2. Hence expression 1 returns true

Expression 2: (10 <= 5*2)

This can be read as: is 10 less than or equal to 5 multiplied by 2. This also evaluates to true as 10 is equal to 5*2. Hence expression 2 returns true.

Now between this two expression is the and operator which evaluates to true if and only if both logical expressions returnes true.

True and True ==> True

Since Expression 1 ==> True and Expression 2 ==> True

This means Expression 1 and Expression 2 ==> True which is the Boolean value returned by the statement

5 0
3 years ago
A network administrator enters the service password-encryption command into the configuration mode of a router. What does this c
Ad libitum [116K]

Answer:

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish? This command prevents someone from viewing the running configuration passwords. You just studied 28 terms!

3 0
3 years ago
Mara is a network system analyst for a large investment firm. What kind of
Alchen [17]

Mara is a network system analyst for a large investment firm. The education that Mara would have needed to achieve this position is  a bachelor's degree in computer science

Explanation:

  • Network systems analysts monitor and maintain computer hardware and software applications for businesses and organizations.
  • They specialize in the infrastructural design of the network and analyze the performance of these systems to best improve it.
  • The network system analyst also research and report the costs of upgrading or replacing the current networking technology used within a business.
  • Most bachelor's programs require completion of general education courses in mathematics, English and statistics.
  • Employers require systems analyst applicants to have at least a bachelor's degree in computer systems analysis, computer science, computer information systems, management information systems, business intelligence or a similar field of study.
  • A network analyst should hold a bachelor's degree in a field related to programming, information assurance, or computer science as a minimum.
  • The new criteria include the employers to look for those who hold a master's degree with the master of business administration.
8 0
3 years ago
Assume a disk cache hit rate (dchr) of 95% and 2 millisecond on average to access a page in cache. If the average access time to
MrRa [10]

Answer:

The answer is provided in the form of explanation

Explanation:

A page fault occurs means that the required page is not in main memory. First OS check for

page in the cache memory, if the page is present then retrieved but if not present then check for

page in main memory and if the page is not present here too then it searches for page in hard

drive. To calculate the expected time, the following formula is used:

Cache hit ratio = 95% = 0.95

Cache miss ratio = 5% = 0.05

Cache access time = 2 millisecond

The average access time of hard drive = 30 milliseconds

Expected time = Hit ratio (cache access time +memory access time) + Miss ratio (cache

access time + 2 * memory access time)

= 0.95 (2+30) + 0.05 (2+2*30)

= 0.95 (32) + 0.05(62)

=30.4 + 3.1

= 33.5 millisecond

Expected time = cache hit ratio * cache access time + (1 – hit ratio) * cache miss ratio

= 0.95*2+(1-0.95)*0.05

= 1.9025

4 0
3 years ago
All about wide area network<br>​
andreev551 [17]

Answer:

a wide area network is also known as (WAN) it is a large information that has been tied to more than a single location you can understand by the diagram shown you can think of it as a network sharing information around the world

6 0
3 years ago
Other questions:
  • What is the device that allows users to manipulate data by controlling an onscreen pointer
    5·2 answers
  • Cell C2 contains the formula "=10+D3". If you copied C2 to A1, what would be the formula in A1? =10+B2 =10+F2 =10+B4 =10+F4
    14·1 answer
  • Advantages and disadvantages of using the command-line interface to manage files and folders
    14·1 answer
  • Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, acc
    9·1 answer
  • C. An error that due to wrong input.​
    13·1 answer
  • How can I watch you-tube on my school computer without it being blocked on the computer when it uses Lightspeed Systems Relay or
    7·1 answer
  • Write a program that ask a user to input radius of a circle and display circumference of a circle
    13·1 answer
  • Coordination in a global information system requires a _____ architecture for data, standardization within departments.
    15·1 answer
  • What is the encoding technique called that is used to store negative numbers in the computer's memory
    10·1 answer
  • Which term means a cryptography mechanism that hides secret communications within various forms of data?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!