1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
3 years ago
15

In Java please:

Computers and Technology
1 answer:
SOVA2 [1]3 years ago
7 0

Answer:dna.java

import java.util.Scanner;

public class dna

public static boolean isvalid(String s)

for (int i = 0; i< s.length()="" ;="">

if(s.charAt(i) != 'C' && s.charAt(i) != 'G' && s.charAt(i) != 'A' && s.charAt(i) != 'T' )

return false;

 

return true;

public static double countc(String s)

double c = 0;

for (int i = 0; i< s.length()="" ;="">

if(s.charAt(i) == 'C' )

c = c+1;

You might be interested in
List three reasons you might use hwinfo when troubleshooting and upgrading a computer
Elza [17]

Solution:

three reasons you might use hwinfo when troubleshooting and upgrading a computer are as follows:

1) If we want to identify a hardware component with out opening the case.

2. if we want identify Features of a motherboard, video card, or processor.

3. establish benchmarks for the components in

8 0
4 years ago
Which of the following software programs provides for e-mail communication?
Mila [183]
Outlook is a software program that provides for e-mail communication
8 0
3 years ago
"The effectiveness of memory retrieval is directly related to the similarity of cues present when the memory was encoded to the
alexdok [17]

Answer:

D

Explanation:

Cause You Have To Decode It To Get To The Memory In The First Place

3 0
3 years ago
A firewall can consist of all devices positioned on the network _____________.
ale4655 [162]

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

6 0
4 years ago
What shows the web address of the page that is currently displayed in the workspace?
babunello [35]

Answer:

In a web browser, the address bar (also location bar or URL bar) is a GUI widget that shows the current URL. The user can type a URL into the bar to navigate to a chosen website.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which statement is a famous quote from Canadian Communications theorist Marshall mcluhan​
    9·1 answer
  • Laser printers are particularly effective for printing _______________.
    6·1 answer
  • A __________ acts as separate network that rests outside the secure network perimeter so untrusted users can access web servers
    10·1 answer
  • Which type of rock is created when lava cools and hardens?
    5·2 answers
  • Purpose of this program:
    12·1 answer
  • Discuss FOUR challenges that have an impact on domestic tourism
    6·1 answer
  • It is an island country; it fought against us in World War II; it is known for sushi.
    14·2 answers
  • You learned that you can use the tags to insert a link to another webpage. One problem that webpage developers face is that, aft
    7·1 answer
  • Where would you click to change the<br><br>Screen Saver?​
    10·2 answers
  • are there any hexadecimal digits that cannot be created using 4 bits? how many bits would you need to represent the hexadecimal
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!