1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
9

Which of the following is a valid call for the generic method declared below? and why?

Computers and Technology
2 answers:
aniked [119]3 years ago
7 0

Answer:print(Companions);

Explanation:it is the name of the array to printed

Komok [63]3 years ago
4 0
Print(companions);

Print(companions);

Print(companions);

Print(companions);
You might be interested in
One form of Intrusion Detection System (IDS) starts operation by generating an alert for every action. Over time, the administra
soldier1979 [14.2K]

Answer:

advantages

- detect anomalies

- information for new security rules

disadvantages

- false alarms

Explanation:

Advantages

- With an IDS we can check and track every attack or detect anomalies even when you don't know about these behaviors.

- When an IDS detects anomalies, the system generates information about these behaviors and you can create new rules for these attacks.

Disadvantages

- When we use an IDS, we could receive false alarms because we cannot predict every behavior.

4 0
4 years ago
Installing unauthorized hardware such as a communication software and modem Select one: a. Is a common practice and does not aff
Alisiya [41]

Answer:

b. May introduce the potential for a security breach using a backdoor programmed into software

Explanation:

muchos malware dedicados al robo de datos son encriptados dentro de codigos que simulan aplicaciones de mensajería, diseñadas para parecerse a programas originales, muchas personas, sin el entrenamiento necesario, no notarían la diferencia, y por desconocimiento instalarían software peligroso.

las empresas, para cuidar el estado de la red, las computadores y los datos que manejan, adquieren softwares de fuentes confiables y verificadas por lo que hacer uso unicamente de estas aplicaciones autorizadas es la manera de mantener segura la red informática de la empresa.

7 0
4 years ago
5. Write a program to remove any duplicate letters from a word and display the new word maintaining the original order. For exam
dexar [7]

Answer:

word = input('Enter a single word: ', 's');

n = length(word);

nodupWord = [];

for i = 1:n

  dup = false;

  c = word(i);

  for j = 1:i-1

      if word(j) == c

          dup = true;

          break;

      end

  end

  if ~dup

      nodupWord = [nodupWord, c]; %add the non-duplicate char to end

  end

end

disp(['Adjusted word: ', nodupWord])

Explanation:

The code is in Python.

3 0
3 years ago
The roman structure that features heavy use of arches and columns is the _______.
lara31 [8.8K]
The appropriate response is colosseum. It is otherwise called Coliseum and Flavian Amphitheater is an oval amphitheater in the focal point of the city of Rome, Italy. Worked of cement and sand, it is the biggest amphitheater at any point assembled.
8 0
4 years ago
Which one of the following functional business systems supports the finance business function?
bogdanovich [222]
It seems that you have missed the given choices for this question, but anyway, here is the correct answer. The functional business systems that supports the finance business function are CASH MANAGEMENT and FINANCIAL FORECASTING. Hope this is the answer that you are looking for. 
5 0
4 years ago
Other questions:
  • Why is a port scan detected from the same ip on a subnet an alarming alert to receive from yourids?
    5·1 answer
  • Convert each of the following bit patterns into whole numbers. Assume the values are stored
    14·1 answer
  • _______is the equal distribution of visual weight on either side of an imaginary axis through the center of a design. A building
    6·2 answers
  • If you attempt an edgeunity quiz is your latest attempt the one counted?
    10·1 answer
  • Assume:
    14·1 answer
  • C++
    11·2 answers
  • Select the correct answer. Which of these statements is an explorer most likely to make?​
    6·1 answer
  • We will use linear interpolation in a C program to estimate the population of NJ between the years of the census, which takes pl
    10·1 answer
  • How to ignore punctuation before and after a word javascript
    13·1 answer
  • URGENT! Drag the tiles to the correct boxes to complete the pairs.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!