1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wewaii [24]
2 years ago
13

HELP AASAP BRAINLIEST JUST HELP

Computers and Technology
1 answer:
elixir [45]2 years ago
7 0

Answer:

d

Explanation:

plz brainliest

You might be interested in
Reimplement StringSet with the exception that it should now extend ArrayList instead of encapsulating a String[]. You can easily
kolbaska11 [484]

Answer:

Here is the program for the given question

Explanation:

class StringSet

{

ArrayList<String> arraylist; //a reference variable of ArrayList of generic type String

//A no argument constructor.

public StringSet()

{

arraylist=new ArrayList<String>(); //instantiating the ArrayList object

}

//A mutator that adds a String newStr to the StringSet object.

void add(String newStr)

{

arraylist.add(newStr); // add(String) method to add string to the arraylist

}

//An accessor that returns the number of String objects that have been added to this StringSet object.

int size()

{

return arraylist.size(); // size() method which gives the number of elements in the list

}

//An accessor that returns the total number of characters in all of the Strings that have been added to this StringSet object.

int numChars()

{

int sum = 0;

for(String str:arraylist) //for-each loop; can be read as for each string in arraylist

{

sum+=str.length();

}

 

return sum;

}

//An accessor that returns the number of Strings in the StringSet object that have exactly len characters.

int countStrings(int len)

{

int count = 0;

for(String str:arraylist)

{

if(str.length() == len)

count++;

}

return count;

}

}

4 0
3 years ago
Two negative reviews and no positive reviews is enough to consider the website to have a negative reputation.
Bas_tet [7]

Two negative reviews and no positive reviews is enough to consider the website to have a negative reputation: False.

<h3>What is reputation?</h3>

In Computer technology, reputation can be defined as a metric which is used to determine the quality of a particular website, especially based on the opinions and ratings by its end users.

In this context, we can infer that two negative reviews and no positive reviews isn't an enough metric to consider a website as having a negative reputation.

Read more on negative reputation here: brainly.com/question/2343924

#SPJ1

4 0
2 years ago
When typing in a cell, hitting Tab will bring which result?
iren2701 [21]

<span>C. 
Move to the next cell down.</span>
7 0
3 years ago
Read 2 more answers
Describe the benefits of having an operational data warehouse (DWH), and the challenges of operating a DWH repository.
kvasek [131]

Answer:

The benefits of having the operational data ware-house are as follows:

  • The single operational warehouse typically support various tactical and the strategical decisions.  
  • It is subject oriented,volatile and integrated data warehousing in the system.
  • The warehousing mainly allow the system to process the large complex data in more efficient manner.
  • The operational warehouse are basically implemented for many business purposes.

The challenges of the operational warehouse repository are as follows:

  • In the operational data warehouse there is large number of user expectations.
  • The cost is the main challenge while designing the operational data warehousing as, it required efficient system in low cost.
  • Choosing the efficient and correct type of the warehouse is the big challenge.

5 0
3 years ago
What is one common result of restructuring?
Oksana_A [137]
One common result of restructuring is new job descriptions.
8 0
3 years ago
Other questions:
  • Select the correct answer from each drop-down menu. Select the correct type of address reference.
    6·2 answers
  • Which of the following information security technology is used for avoiding browser-based hacking?
    11·2 answers
  • Create a simple main() that solves the subset sum problem for any vector of ints. Here is an example of the set-up and output. Y
    12·1 answer
  • Explain how Deep Packet Inspection works (DPI). How is this technology beneficial to Perimeter Security? Lastly, describe a scen
    6·1 answer
  • How should you decide what to wear to an interview? What kind of things should be considered?
    12·1 answer
  • Give an example of a process that may need a flowchart to clarify procedures.<br><br> HELP ASAP!
    7·1 answer
  • What steps might a company or organization need take in order to keep its digital data secure online?
    8·1 answer
  • Can somebody help me out
    15·1 answer
  • 1
    13·1 answer
  • The net force on a vehicle that is accelerating at a rate of 1.2 m/s2 is 1500 newtons. What is the mass of the vehicle to the ne
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!