1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
user100 [1]
4 years ago
8

I need Help Right now!!!!!!!!!!!!!!!!!!!!!!!!!

Computers and Technology
1 answer:
Vikki [24]4 years ago
5 0
Analog<span> and </span>digital<span> signals are used to transmit information, usually through electric signals. In both these technologies, the information, such as any audio or video, is transformed into electric signals. The </span>difference between analog and digital<span> technologies is that in analog technology, information is translated into electric pulses of varying amplitude. In digital technology, translation of information is into binary format (zero or one) where each bit is representative of two distinct amplitudes. analog vs digital</span>
You might be interested in
Explain the 2 types of network topology ​
Ede4ka [16]

Answer:

Mesh- The mesh topology has a unique network design in which each computer on the network connects to every other.

Tree- Tree topologies have a root node, and all other nodes are connected which forming a hierarchy.

pls mark as brainliest

Explanation:

4 0
3 years ago
A Trojan horse:
Elis [28]

Answer:

The answer is "option D"

Explanation:

Trojan horse is a software, that is installed on a system and appears benign, but in actual it is the addition of malicious which unexpected modifications in config files and unusual activity even when the computer is idle are strong signs that a Trojan exists on a system. and other options are not correct that can be described as follows:

  • In option A, It is a malware that is also known as Trojan.
  • In option B, It is malware, not a virus but the malware includes viruses.
  • In option C, It doesn't install spyware on the user's computer.
  • In option E, It doesn't use for enterprise networks to penetrate.
4 0
3 years ago
Describe, with examples, the way in which a defect in software can cause harm to a person, to the environment, or to a company
Arisa [49]

Answer:

Losing jobs. Fire. Destruction of property.

Explanation:

Having a company shut down due to lack of protection and having people testify products unsafe. If software blows up it could cause desturction of property therefore causing the effect of many people losing their jobs.

4 0
3 years ago
If a salesperson were trying to sell this cabin, which word would be best to use to make its size seem most positive?
TiliK225 [7]
cozy because it gives it more of a positive connotation
7 0
3 years ago
Read 2 more answers
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
riadik2000 [5.3K]

Answer:

import java.util.Scanner;

public class ANot {

   public static void main(String[] args) {

       System.out.println("Enter a character");

       Scanner in = new Scanner(System.in);

       char character = in.next().charAt(0);

       System.out.println("Enter a string");

       String string = in.next();

//Calling the method        

System.out.println(countChar(character,string));

   }

   public static int countChar(char a, String in){

       int counter =0; // initialize counter

       for (int i=0;i<in.length();i++){

           if(a == in.charAt(i))

               counter++;

       }

       return counter;

   }

}

Explanation:

This program is written in Java Programming language.

We created a method countChar that returns a integer called counter

Using a for loop in the method we iterate through the string object and check (a == in.charAt(i)) so as to increase counter when ever there is a match.

In the main method a Scanner Class is used to request user to input a character and a string which is passed to countChar when called.

NOTE that this program has considered lower case letters to be different from upper cases as such a is not equal to A

3 0
3 years ago
Other questions:
  • write a 〕ava program to sort a random list of 10 numbers entered b y user in an array using Selection Sort technique
    5·1 answer
  • John would like to move from the city into the suburbs and has been saving up a large down payment for a home. Which is the most
    7·1 answer
  • 4. What are five actions you should do to care for your camera?
    15·1 answer
  • Write two methods: encrypt and decrypt. encrypt should #take as input a string, and return an encrypted version #of it according
    6·1 answer
  • You can add a new slide to a presentation by
    11·1 answer
  • Delivering is not considered in supply chain analysis when outside carriers are contracted to move products to customers.
    15·1 answer
  • What is the answer to in Microsoft Word you can access the blank from the command command from the mini toolbar what is the corr
    10·2 answers
  • If i hit the delete key three times what will be left
    12·1 answer
  • List two major problems that could be addressed by futuring.
    15·1 answer
  • Filtering is a function of _____.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!