1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlabodo [156]
2 years ago
13

what is the command used to retrieve the java files along with the string existence "Hello world" in it​

Computers and Technology
1 answer:
Leona [35]2 years ago
8 0

Answer:

java” xargs grep -i "Hello World”

You might be interested in
Which of the following is NOT AN EXAMPLE of personal identifying
alexgriva [62]

Answer:

Your Social security number .

Explanation:

  • Personal information is the information of. a person.
  • It includes The name,Address,number etc of the person .
  • the PAN,Debit and credit card number is also included .

6 0
3 years ago
Read 2 more answers
Based on​ Sam's description of an information​ system, all of the following are components of an IS except​ _____.
svetoff [14.1K]

Answer:

the answer is A

Explanation:

My smartness

5 0
3 years ago
Thsi is for gacha girl5467
djyliett [7]

Answer:

lol

Explanation:

3 0
3 years ago
Read 2 more answers
I will mark you as BRAINLIEST if you give me the correct answer of the questions... Pls asap with all details i am time limited
Alex_Xolod [135]

Answer:

11. 1million square decimetres (from online)

20. assuming room is rectangular,

length= (p - 2b)/2

because perimeter= 2 length + 2 breadth for rectangular

6 0
2 years ago
Read 2 more answers
Name the different types of constructors that a designer can provide in a class. Provide an example with a class showing many co
Marrrta [24]
By default, if you do not implement a constructor, the compiler will use an empty constructor (no parameters and no code). The following code will create an instance of the MyObject class using the default constructor. The object will have the default vauesfor all the attributes since no parameters were given.

MyObject obj = new MyObject();

Another type of constructor is one with no parameters (no-arg constructor). It is similar to the default, except you actually create this constructor. The contents of the the constructor may include anything. To call a no-arg constructor, use the same line of code as above. The constructor can look like the one below:

public MyObject() {
System.out.println("This is a no-arg constructor");
}

Lastly there is the parameterized constructor. This type of constructor takes in parameters as inputs to assign to values in the newly created object. You call a parameterized constructor as follows:

MyObject obj = new MyObject("Bob", 20);

The constructor will look like this:

public MyObject(String name, int age) {
this.name = name;
this.age = age;
}

In the constructor, the keyword "this" refers to the object, so this.name is a private global variable that is being set equal to the inputted value for name, in this case "Bob".

Hope this helps!
8 0
3 years ago
Other questions:
  • Implement a program to measure the impact of application-level buffer sizes on read time. This involves writing to and reading f
    13·1 answer
  • What is meant by polling mode in communication between software andUART and what is its disadvantage as compared to interrupt mo
    14·1 answer
  • A table is a useful way to present information that is organized into categories, or fields.
    15·1 answer
  • Josephine is in the process of creating ads within her Standard Display campaign. She finds that there are two main ad formats t
    5·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an <br> ___?
    14·1 answer
  • Hypercompetition implies that any architecture must be designed with maximum flexibility and _____ to ensure it can handle the i
    6·1 answer
  • Briefly describe the fundamental differences between project-based and product-based Software Engineering.
    10·1 answer
  • What is a computer class from 8​
    12·1 answer
  • What is data intergrity​
    13·1 answer
  • What plan can businesses use to protect sensitive data from malicious attacks?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!