1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novosadov [1.4K]
3 years ago
12

Public class Main{ public static void main(String [] args){ String name=WelcomeJava; Runnable r1=() -> System.out.println(nam

e); String name1 = name.toUpperCase(); Runnable r2=() -> System.out.println(name1); r1.run(); } }
What is the output of the above program?
Computers and Technology
1 answer:
tatuchka [14]3 years ago
6 0

Answer:

Concept: Programming

  1. You take a string as an input, and you output the result which is a user defined name.
  2. Then you take that name and turn all the strings to uppercase in name and return that result.
  3. Rate brainlist
You might be interested in
Differentiated instruction is designed to educate children through ________ techniques in order to ensure every student is being
EleoNora [17]
They use multiple techniques to help children. 
7 0
3 years ago
Why it is so important for all application builders to always check data received from unknown sources, such as web applications
Aleks04 [339]
The already-long problem on hacking and other security-related cases necessitates for the application builders to check the data received from unknown sources. To further strengthen the security, even data received from known sources also need to be check as these may also contain harmful viruses creating critical problem to the application. 
6 0
3 years ago
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
Which of the following correctly describes the Filter procedure for managing spreadsheet data? Check all that apply.
saveliy_v [14]

Answer:

Filtering procedure provides an essay and convenient way to visualize or work only with the data we desire without needing to delete those we do not need at that moment.

Filter allows you to view only the information you want to see. Only the required information is displayed at that moment once the filter criteria has been checked.

Filter temporarily hides rows of data that you do not need to view. Rows of data which aren't needed at the moment are temporarily hidden in other to allow user concentrate on the needed data.

Filter allows you to filter text and numeric data. Filtering allows for different filtering criteria, if the user requires working or viewing only on text or numeric data, it is possible with spreadsheet filter.

Explanation:

Filter allows you to view only the information you want to see.

Filter temporarily hides rows of data that you do not need to view

Filter allows you to filter text and numeric data.

5 0
3 years ago
Read 2 more answers
What is one major component that would not be found in a tablet or phone, and how has modern computing made that component less
IRISSAK [1]

Answer:

A hard drive

Explanation:

Since tablets and phones are compact, they are better off not having a big, giant, bulky storage device like hard drives. Modern computing made hard drives less important by developing Solid-State Drives (SSDs) and extremely dense (512 bit) storage that can provide the same if not more storage than a traditional hard drive at the fraction of the size.

5 0
3 years ago
Read 2 more answers
Other questions:
  • If you are planning to carry a large balance on your credit card, which of the following credit card features should you look fo
    7·2 answers
  • How many rows and columns does ms-excel 2007 have???
    10·1 answer
  • A user reports that nothing happens when he or she attempts to print from the computer at his desk. This points to a possible pr
    11·2 answers
  • Replmon is the first tool you should use when troubleshooting Active Directory replication issues. State True or False.
    12·1 answer
  • which of these describe raw data?check all of the boxes that apply A) what a person buys B) where a person lives C) data that ha
    9·1 answer
  • Of the measures of feasibility in the accompanying figure, ____ considers points such as "Does the proposed platform have suffic
    8·1 answer
  • When you type in text in an image in a photo-editing software, where is it created?
    8·1 answer
  • Write if true or false
    11·1 answer
  • ____ is an example of a set of prewritten classes that allows you to access data stored in a database.
    8·1 answer
  • A document commonly used in real estate transactions, detailing the fees, commissions, insurance, etc. that must be transacted f
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!