1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
3 years ago
5

What kind of information does the Internet sends? bits date bytes binary

Computers and Technology
1 answer:
Murrr4er [49]3 years ago
4 0

Answer: dates .

Explanation:

You might be interested in
Write a recursive method that finds the number of occurrences of a specified letter in a string using the following method heade
Dafna1 [17]

Answer:

//Java program to find the number of occurrences of a specified character in a string.

// Import the required packages.

import java.io.*;

import java.util.*;

//class declaration

class CharacterCount

{

// Main method.

public static void main (string args[ ] )

{

  try

      {

     // Taking the input from the user.

         System. out.print ("Type a string to analyze: ");

     // Creating the scanner class object.

         scanner input = new scanner (system. in);

         String str = input .next();

         System.out.print("Type a character to check: ")

         String temp = input.next();

         char c = temp.charAt(0);

     // Calling the method to get the character count.

         int count = <em>count</em>(str,c);

     // Displaying the result.

         system.out.print In("There are " + count + " " + c + " 's. ");

     // catching the exception.

         catch(Exception e)

         System.out.print In("Exception has occured in the class . Program will exit. ");

      // Exiting the system.

         System.exit(0);

         }

}

// Method to calculate the character count.

public static int count(String str, char a)

  {

    // checking for null string input.

      if(str.equals(""))

      {

       return 0;

      }

      else

      {

      int k = 0;

    // Character matching check.

      if ( str.substring(0, 1) . equals (Character.<em>toString</em>(a)) )

      {

   // Incrementing the counter.

      k++;

      }

   // Recursive call

      k += <em>count</em>(str.substring(1) , a);

              return k;

       }

     }

}

Explanation:

Output should show: Type a string to analyze: welcome

                                   Type a character to check: e

                                   There are 2 e's.

3 0
4 years ago
Claire wants to be a digital media coordinator. What requirements does she need to fulfill in order to pursue this career?
NemiM [27]

Answer:

Check below for the answer and explanations

Explanation:

Digital media coordinators are professionals that create and manage digital contents. They create and manage websites, blogs, social media platforms, e-commerce sites, etc.

To be a practitioner in this field, Claire needs a first degree in any of digital media, social sciences, communications, computer science and similar courses.

She needs to have a good knowledge of computer software, a high reasoning skill and a laudable communications skill.

5 0
3 years ago
Who invented the collodian process
pentagon [3]
Frederick Scott Archer
5 0
3 years ago
Read 2 more answers
The most common cause of foodborne illness is
nignag [31]

Answer:

Food posioning

Explanation:

8 0
4 years ago
Read 2 more answers
A competitor goes to your public website and discovers that they can get into a directory that you did not know could be reached
Ivan

Answer:

Yes, directory traversal attack.

Explanation:

A website is a collection big web pages hosted on a web server. It contains contents like links and sometimes directory root paths. This a vulnerability attacks an exploit to access the information in a database.

There are two access to a database. One is the authentication process issued for authorised user access and the other is the root access only accessible to the network administrator. It contains paths to directories in the servers.

A directory traversal attack or path attack is done through a web browser by an attacker, who seeks for a weak path link on the public's website and accesses the information in the server.

5 0
3 years ago
Other questions:
  • What is unique about being an administrative professional in a government job?
    8·2 answers
  • An app for a hair styling stop needs a form for the various services that they offer. What control should be used to display all
    6·1 answer
  • If an Administrator performs a clean install of Windows Server 2012 R2 on a new server, and then moves critical domain services
    9·1 answer
  • The ____ is composed of tabs, each containing groups of related commands.
    15·1 answer
  • The internet is best described as a vast
    7·2 answers
  • Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this eviden
    6·1 answer
  • Next
    12·1 answer
  • How to convert mkv to avi without losing quality?
    14·1 answer
  • Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output i
    12·2 answers
  • write a function named list_total that accepts a list as an argument (assume the list contains integers) and returns the cumulat
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!