1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
3 years ago
8

In this exercise, first run the code as it is given to see the intended output. Then trace through each of the 3 variables to se

e what is actually going on in memory. Show the values of str1, str2, and str3 and the output after each line of code on a piece of paper.
Computers and Technology
1 answer:
dlinn [17]3 years ago
3 0

Answer:

The memory with variable names str1, str2, and str3 all have equal and the same value after the first if-statement.

Explanation:

The str1 was first assigned a null value while the str2 and str3 were assigned the string value "Karen" with the String class and directly respectively. On the first if-statement, the condition checks if the str1 is null and assigns the value of the variable str2 to str1, then the other conditional statement compares the values of all the string variables.

You might be interested in
Describe shortly about the following Linux directories and theirpurpose,1. lib2. etc3. Boot4. Root5. home
Bingel [31]

Answer:

 Linux directories and their purposes are:

1) lib - Lib file contained the share object library file which necessary to boots system and this directory contain file module stored in the kernel.

2) etc - etc file is the configuration file that they are local in the machines. When the program run these file are stored in the directories. this can be static and do not executable directory.

3) Boot - Boot file are stored in the directory which required processing of linux boot and such files are included in the linux kernel of the file.

4) Root - Root file are the best user root directory and user cannot view this directories from there account. This file usually contain administrative file system.  

5) Home - Home file contained the user directory and it is the default system of linux. Home directory helps user to enable any network system to access there home directories.

5 0
3 years ago
Why is important to build strong connections
Nana76 [90]
Cause weak ones aren't that strong and can easily break, but a strong connection will last longer and will be harder to break. For example you need to build a connection with your dog or else your dog wont trust you. Basically building a strong connection always you to build the trust stronger.... I think this is the answer you are looking for depending on what connection you are looking for
4 0
3 years ago
Read 2 more answers
Graphic design has evolved rapidly in recent years with the advancement of digital technology. Discuss how the evolution of grap
Yuki888 [10]
We interact with products of graphic design every day. Graphic design is used to make the billboards we drive by on our way to school, the pleasing layout of our favorite website, the covers of our most loved book, even the traffic signs we pass. The evolution of graphic design has only improved our visual world. Designers are constantly seeking to find the best and most effective ways of presentation, which means that the traffic signs you see are in a bold, large font so that you don't have to squint to read them. This is a result of designer's constant process of seeking out the most effective tools of visual communication that will make our lives easier, whether we're aware of it or not.
4 0
3 years ago
. Is it conceivable to design a secure operating system for these computer systems? Give arguments for and against.
Lena [83]

Answer:

A favor:  porque permite manejar la memoria, disco, medios de almacenamiento de información y los diferentes periféricos o recursos de nuestra computadora, como son el teclado, el mouse, la impresora, la placa de red, entre otros.

En contra:

Si uno llega a fallar con un codigo en algun sistema puede verse afectado el dispositivo

Explanation:

8 0
3 years ago
Write the function lettersOnly(s) that takes in a string called s, and returns a string containing only the alphabetic character
Phantasy [73]

Answer:

The program to this question as follows:

Program:

def lettersOnly(s): #defining method lettersOnly

   val="" #defining string variable that return value

   for i in s: #defining loop to calculate value

       if(i.isalpha()): #check condition that value is string

           val=val+ i #add value

   return val #return value

print(lettersOnly("data3base_ro1c3k5s")) #call method and print value

Output:

databaserocks

Explanation:

In the above python code, a method lettersOnly is declared that accepts a string variable  "s" in its parameter. Inside the method, a string variable "val", and loop is declared, in which the "val" variable holds method return value.

  • In the loop and if block is used that uses "isalpha" string method, which checks the check alphabetic character in the given value. if this is true it will calculate all value in "val" variable and return its value.    
  • At the last, the print method is used, which calls the lettersOnly method and prints its return value.
4 0
3 years ago
Other questions:
  • If a gas gosts 3.60 per gallon how much doe sit cost to drive 500 miles in the city
    5·1 answer
  • Assume that you have an array of integers named arr. The following program segment is intended to sum arr [0]through arr[n−1], w
    7·1 answer
  • Brainliest to whoever can guess what year this corvette logo is from. Make your guesses
    11·1 answer
  • Which are types of online resources that students can use for help? Check all that apply. simulated labs web-based educational g
    12·2 answers
  • Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's employees.
    13·1 answer
  • Help please brainliest
    8·1 answer
  • Which method can help you prevent RSI while using a keyboard?
    14·1 answer
  • Check examples of a good work ethic. *
    6·1 answer
  • What is the term used when a password is obtained through tricking a user into giving it to another party?
    15·1 answer
  • What’s cloud-based LinkedIn automation?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!