1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masha68 [24]
3 years ago
13

What happens when a string doesn’t include the separator that’s specified in the parameter of the split() method?

Computers and Technology
1 answer:
Brilliant_brown [7]3 years ago
5 0

Answer:

Nothing

Explanation:

If a seperator value is provided as an argument within the split() method and the string does not include that value then the string will remain the same and will not be split. If no value is provided as an argument within the split() method, then the string that the method is being applied to will automatically be split in every space character (" ") that exists within it. This is the default value of split() when no argument is passed to it.

You might be interested in
How to transfer bookmarks to new computer
Romashka-Z-Leto [24]

Explanation:

On your computer, open Chrome

.At the top right, click More

.Select Bookmarks Import Bookmarks and Settings

.Select the program that contains the bookmarks you'd like to import.Click Import.

Click Done

3 0
3 years ago
How are the internet and the World Wide Web different from each other
jeka94

The terms Internet and World Wide Web are often used interchangeably in everyday speech; it is common to speak it as " going on the Internet " when using a web browser to view web pages. However, the World Wide Web is only one of a large number of Internet services.

4 0
3 years ago
A leading global vendor of computer software, hardware for computer, mobile and gaming systems, and
V125BC [204]

Answer:

Microsoft

Explanation:

5 0
2 years ago
What stores all software and files on your computer and reads and writes data onto a spinning magnetic or optical disk?
stiv31 [10]

Answer:

Depends. could be an external opticial drive, a scuzi drive, a real to real tape system, or just a simple electromagnetic hard drive with speeds of 1000 rpm or more

8 0
3 years ago
A network administrator identifies sensitive files being transferred from a workstation in the LAN to an unauthorized outside IP
Sav [38]

Answer:

D. Zero-day

Explanation:

It is clearly stated that the antivirus is still up-to-date on the workstation, and there has been no alterations to the firewall. Hence, this means the software is functional and up-to-date with all known viruses. This shows that this attack is unknown to the manufacturer of the antivirus software and hence no virus definition or patch fixing this problem has been developed yet. In this light, it is a zero-day.

A zero-day is a type of vulnerability in a software that is not yet known to the vendor or manufacturer, hence this security hole makes the software vulnerable to attackers or hacker before it is been fixed.

4 0
3 years ago
Other questions:
  • Which does plug-and-play refer to?
    13·2 answers
  • What is not a common purpose for a research report?
    5·2 answers
  • Which one of these is correct PI of a XML document?
    13·1 answer
  • Which type of CPU instruction performs arithmetic calculations and stores the results in memory?
    14·2 answers
  • Tradegy deals with _____
    14·1 answer
  • Alexi is writing a program which prompts users to enter their age. Which function should she use?
    6·2 answers
  • Can you be my friend plz
    9·1 answer
  • Whats the formatting of a letter to the editor?​
    12·1 answer
  • You are not sure if a certain word has an"e"at the end<br>​
    11·1 answer
  • How does your ability to correctly count change affect the impression the customer has of you?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!