1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bija089 [108]
3 years ago
9

What is green market?

Computers and Technology
1 answer:
Fynjy0 [20]3 years ago
4 0
Green marketing<span> is the </span>marketing<span> of products that are presumed to be environmentally preferable to others.Thus </span>green marketing<span> incorporates a broad range of activities, including product modification, changes to the production process, sustainable packaging, as well as modifying advertising.</span>
You might be interested in
First, launch NetBeans and close any previous projects that may be open (at the top menu go to File ==&gt; Close All Projects).
Mars2501 [29]

Answer:

See explaination

Explanation:

// LetterCount.java

import java.io.File;

import java.io.IOException;

import java.io.PrintWriter;

import java.util.NoSuchElementException;

import java.util.Scanner;

public class LetterCount {

public static void main(String[] args) {

// setting up a Scanner to read from keyboard

Scanner scanner = new Scanner(System.in);

try {

// asking and reading input file name

System.out.print("Enter name of input file: ");

String file = scanner.nextLine();

// reinitializing scanner to read from input file. this will throw

// file not found exception if file is not found.

scanner = new Scanner(new File(file));

// opening a file writer to create and write into output.txt file

PrintWriter writer = new PrintWriter(new File("output.txt"));

// creating a String containing all 26 alphabets

String alphabet = "abcdefghijklmnopqrstuvwxyz";

// creating an array containing 26 integers, all initialized to 0

int counts[] = new int[26];

// looping through the file

while (scanner.hasNext()) {

// reading next line, converting to lower case

String word = scanner.next().toLowerCase();

// looping through each character in current word

for (char c : word.toCharArray()) {

// finding index of c in alphabet

int index = alphabet.indexOf(c);

// if c is an alphabet, the index value will not be -1

if (index != -1) {

// incrementing counter at index position

counts[index]++;

}

}

}

// closing input file

scanner.close();

int largestCount = 0; // to store largest count of a character

String mostCommon = ""; // to store the character(s) that occur the

// most

// looping through counts array, finding the largest value

for (int i = 0; i < counts.length; i++) {

if (counts[i] > largestCount) {

// updating largestCount and mostCommon

largestCount = counts[i];

mostCommon = alphabet.charAt(i) + "";

} else if (counts[i] == largestCount) {

// same largest count, appending to mostCommon string

mostCommon += " " + alphabet.charAt(i);

}

}

// writing results to output file

writer.println("The most common letter(s): " + mostCommon);

writer.println("Count of occurrances: " + largestCount);

// closing file, saving changes, alerting user

writer.close();

System.out

.println("done! please check output.txt file for results.");

} catch (IOException e) {

// will be executed when the input/output file cant be opened or

// found, or if there is an error while reading the file

System.out.println(e.getMessage());

} catch (NoSuchElementException e) {

// will occur when there is no input provided for input file name.

System.out.println("No input!");

}

}

}

8 0
3 years ago
For the purposes of laying out content, the total height of a box is calculated by adding which of the following?
jenyasd209 [6]
<span>When laying out content, the box is calculated by setting the width and height of the element using CSS to the size of the content area, the full size of an element can be calculated by also adding in borders, padding and margins.</span>
6 0
3 years ago
Read 2 more answers
To execute sas code, you can click on which icon?
faltersainse [42]

To execute SAS code, an icon which you can click on is: e. running man.

<h3>What is SAS?</h3>

SAS is an abbreviation for Statistical Analysis System and it can be defined as a statistical software suite which was developed at North Carolina State University by SAS Institute for the following field of study:

  • Business intelligence
  • Criminal investigation
  • Data management
  • Multivariate analysis
  • Advanced analytics
  • Predictive analytics

In Computer programming, running man is an icon which you can click on, in order to execute SAS code.

Read more on Statistical Analysis here: brainly.com/question/24439065

#SPJ1

7 0
2 years ago
Which comparison operator means ‘is not equal to’?
SSSSS [86.1K]

Answer:

A. !=

Explanation:

== Means equal, != is like a block of that, meaning NOT EQUAL

5 0
3 years ago
As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some p
Savatey [412]

Answer:

Disadvantages of public key cryptography is that : Assymetric cryptography is slower than the private key cryptography.

Explanation:

We are dealing with big data applications most of time. Almost all applications are data intensive. Private key cryptography which is also known as symmetric cryptography. Symmetric cryptography based systems are faster. Since there is no key transmitted with the data, encrypted data can be transferred over the channel or session even if the path is vulnerable or have chances of interception as the chances of decrypting the data is almost impossible.

Also, The identity of the receiver is guaranteed using the password based authentication used by symmetric crypto systems. Only the trusted receiver who has the access to the secret key can only decrypt the payload

Public Key Cryptography is slower than private key cryptography. Today’s application’s are data intensive. In case of data intensive applications , encrypting huge data will take a lot more time than that of symmetric key cryptography. Whenever Bulk data transmission is needed symmetric key cryptography is preferred. Secret key based crypto systems have proven to be more faster than any currently available assymetric key based crypto systems.

7 0
3 years ago
Other questions:
  • ____ takes the idea of breaking down a program into separate and reusable functions to the next level by focusing on the encapsu
    10·1 answer
  • Seven basic internal components found in a computer tower
    8·1 answer
  • True or False: You should only use your mirrors to see behind you when parallel parking.
    14·2 answers
  • Can You Get Commission Shortcut For FREE?
    15·1 answer
  • Select the organizational skills that can help with
    6·1 answer
  • If you need to determine impacts on revenue resulting from an increase or
    15·1 answer
  • True or false Encryption prevents hackers from hacking data?
    8·1 answer
  • Please help
    11·1 answer
  • ____coping skills are instinctive.<br> A. All<br> B. No<br> C. Some
    9·1 answer
  • Who is maintain data and time of computer?​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!