Answer:
false true
Explanation:
In the code snippet, two string objects are created in java with the value Java.
The print method first checks the condition s1==s2 and outputs false, This is so because the operator == which is used for equality in other primitive data types like ints cannot be applied to the String data type. In the second part of the print function, the equals function s1.equals(s2) is used and it prints true since the two string are equal
Answer:
Cloud Computing
Explanation:
Cloud Computing is basically an infrastructure to deliver various computing resources and services to the users online (via Internet). These resources include networks, applications, servers, databases, software, storage etc.
These services are mostly utilized by organizations for recovery and backup of data, using virtual hardware and other computing resources such as desktops, memory etc. Cloud computing is also used for developing software, for securing data by providing with access control and for storing bulk of data.
The benefits of cloud computing are as following:
Because of cloud computing the customers do not have to buy hardware or install software on their computer which might be very costly to maintain and update. Servers and data centers are provided by cloud service providers and experts are available for managing the services and resources.
These services are scalable and can be adjusted as per the users requirements.
Cloud computing offers a variety of protocols, tools, and access controls that improve security and protects confidential data, applications, and networks against security threats and attacks. It also provides with data backup, disaster recovery.
There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
<span>1.editing the image file in a dedicated photo editing program before inserting it
Hope this reaches you before net neutrality sets in</span>
Answer:
i think Make variables to represent the length and width of a rectangle, called length
and width
, respectively. You should set length
to 10 and width
to 5.
Then, write some mathematical expressions to computer the area and perimeter of the rectangle and save these values inside variables named area and perimeter
.Use print
statements to display the area and perimeter of the rectangle.
Your output should print the area on the first line and the perimeter on the second, like this:
50 30 Rectangle Area Formula:
Area = L * W
Explanation: