1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aloiza [94]
3 years ago
10

Which data type is also called a binary object?

Computers and Technology
1 answer:
Leno4ka [110]3 years ago
4 0
For Plato users it's 
2. BLOb
You might be interested in
Difference between alt tab and windows tab
Kryger [21]
Alt+Tab switches between windows instantly while Windows+Tab displays all currently active windows.
Hope this helps :D
7 0
3 years ago
The web development team is having difficulty connecting by ssh to your local web server, and you notice the proper rule is miss
joja [24]

Answer:

Option b (Port 22) seems to the appropriate choice.

Explanation:

<u>Below seem to be some measure you should take to correct this mistake.</u>

  • Verify whether Droplet's host IP address seems to be right.  
  • Verify existing connection supports communication over all the utilized SSH port. Any access points can be able to block port 22 and sometimes customized SSH. For illustration, you could do this by checking different hosts who used the same port, using only a recognized working SSH connection. These could help you identify unless the current problem is not particular to clients' Droplet.
  • Authenticate the Droplet configuration settings. Verify that they're not being configured to DROP 's preferred policy, and do not apply the port to require connectivity.

The SSH server also operates on port 22, by default.  

Other choices don't apply to the specified scenario. So that the argument presented above will be appropriate.

7 0
3 years ago
The purpose of the ________ protocol is to ensure the integrity of the communication.
Vladimir [108]

The purpose of the transmission control protocol is to ensure the integrity of the communication.

The TCP/IP network architecture also refers to the Internet architecture. The Transmission Control Protocol (TCP) is a transport layer protocol, and the Internet Protocol (IP) is a network layer protocol.

<h3>What is Transmission control protocol ?</h3>

Transmission Control Protocol, or TCP, is a communications standard that enables computer hardware and software to exchange messages over a network. It is intended to send packets over the internet and make sure that data and messages are successfully delivered through networks.

  • TCP's (Transmission Control Protocol) purpose is to regulate data transport so that it is dependable. Connection management, dependability, flow control, and congestion control are the four fundamental TCP functions. Connection initialization (a three-way handshake) and termination are included in connection management.

Learn more about Transmission control protocol here:

brainly.com/question/14280351

#SPJ4

3 0
2 years ago
Your program has a loop where a user guesses a letter.
baherus [9]

Answer:

This code loop depends on what you are actually using, JavaScript, Python? But it normally the user 'input'. Represented as an 'int' (integer). Also, I don't understand this.

5 0
3 years ago
Read 2 more answers
Write a program that can print a banner with rotated letters, such that they can be read from top to bottom. Specifically, each
My name is Ann [436]

Answer:

package Lab6Problema;

import java.util.Scanner;

public class Lab6Problema{

public static void H() // prints H

{

System.out.println();

System.out.println("** **");

System.out.println("** **");

System.out.println("******");

System.out.println("** **");

System.out.println("** **");

}

 

public static void E()//prints E

{

System.out.println();

System.out.println("******");

System.out.println("** ");

System.out.println("******");

System.out.println("** ");

System.out.println("******");

}

 

public static void L()//prints L

{

System.out.println();

System.out.println("* ");

System.out.println("* ");

System.out.println("* ");

System.out.println("* ");

System.out.println("******");

}

 

public static void O()//prints O

{

System.out.println();

System.out.println("******");

System.out.println("* *");

System.out.println("* *");

System.out.println("* *");

System.out.println("******");

}

 

public static void W()//prints W

{

System.out.println();

System.out.println("* *");

System.out.println("* *");

System.out.println("* ** *");

System.out.println("* ** *");

System.out.println("** **");

}

 

public static void R()//prints R

{

System.out.println();

System.out.println("***** ");

System.out.println("** **");

System.out.println("***** ");

System.out.println("** **");

System.out.println("** **");

}

 

public static void D()//prints D

{

System.out.println();

System.out.println("**** ");

System.out.println("* * ");

System.out.println("* *");

System.out.println("** * ");

System.out.println("**** ");

}

public static void blank() //prints blank space

{

System.out.println();

System.out.println();

System.out.println();

}

public static void main(String[] args) {

//just enter "Hello World" as input as specified

System.out.println("Enter a Message");

Scanner scan=new Scanner(System.in);

String myMessage=scan.nextLine(); // read msg using scanner

int numOfCharacters=myMessage.length();// calculate message lenth

for(int i=0;i<numOfCharacters;i++) // loop through each chracter in msg

{

// gets character at position i, and switch accordingly

switch(myMessage.charAt(i))

{

// if character is 'H' or 'h', call method H(). Similarly for other

// Hecharacters in message.

case 'H':

case 'h':H();break;

case 'E':

case 'e':E();break;

case 'L':

case 'l':L();break;

case 'O':

case 'o':O();break;

case 'W':

case 'w':W();break;

case 'R':

case 'r':R();break;

case 'D':

case 'd':D();break;

case ' ':blank();break;

}

}

}

}

Explanation:

4 0
3 years ago
Other questions:
  • How do all apple phones work?
    7·1 answer
  • Identify two related tables in the JustLee Books database. Identify the common field between the two tables. Decide which column
    11·1 answer
  • Python: Write a program that asks the user how many Fibonnaci numbers to generate and then generates them.
    10·1 answer
  • Universal Containers (UC) has decided to build a new, highly sensitive application on the Force platform. The security team at U
    11·1 answer
  • 1. Show the 16-bit representation of the decimal number 2437. Show your steps. 2. Convert the 16-bit representation of part (a)
    12·1 answer
  • Whats the best way to get into a computers programming to get past firewalls
    15·2 answers
  • 111+ 11- 1 <br><br><br>1111+1111<br><br><br><br><br>1101 +1101<br><br><br>1010-11​
    10·2 answers
  • 1. What are the advantages and disadvantages of the digital darkroom as compared to a regular darkroom?
    15·1 answer
  • The term platform as a service has generally meant a package of security services offered by a service provider that offloads mu
    9·1 answer
  • 4. Each mobile device described in this chapter requires that the user have a/an ____________________ associated with services o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!