1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelechka [254]
2 years ago
12

PLEASE HELP!

Computers and Technology
1 answer:
ss7ja [257]2 years ago
3 0

Explanation:

Case-sensitivity is inherently faster to parse (albeit only slightly) since it can compare character sequences directly without having to figure out which characters are equivalent to each other. It allows the implementer of a class/library to control how casing is used in the code.

You might be interested in
What type of control repairs the effects of damage from an attack? Physical control Technical control Corrective control Logical
Inessa [10]

Answer:

Corrective Control

Explanation:

Physical Control are devices that limit access or otherwise protect a resource, such as fences, doors, locks and fire extinguishers.

Technical Control are devices or processes that limit access to resources. Examples include user authentication, antivirus software, and firewalls. Technical controls are also called <em>Logical Control</em>

Corrective Control repair the effects of damage from an attack.  Corrective contol include: include virus removal procedures, firewall table updates, and user authorisation database updates.

8 0
3 years ago
) Write the code to display the content below using user input. The program Name is Half_XmasTree. This program MUST use (ONLY)
harina [27]

Answer:

Following are the program in java language that is mention below

Explanation:

import java.util.*;  // import package

public class Half_XmasTree // main class

{

public static void main(String args[])  // main method

{

int k,i1,j1; // variable declaration  

Scanner sc2=new Scanner(System.in);   // create the object of scanner

System.out.println("Enter the Number of rows : ");

k=sc2.nextInt(); // Read input by user

for(i1=0;i1<k;i1++)  //iterating the loop

{

for(j1=0;j1<i1;j1++)  // iterating the loop

System.out.print(" ");

for(int r=k-i1;r>0;r--)  //iterating loop

System.out.print("*");  // print *

System.out.println();

}

}

}

Output:

Following are the attachment of output

Following are the description of program

  • Declared a variable k,i1,j1 as integer type .
  • Create a instance of scanner class "sc2" for taking the input of the rows.
  • Read the input of row in the variable "K" by using nextInt() method .
  • We used three for loop for implement this program .
  • In the last loop we print the * by using system.println() method.

4 0
2 years ago
1. It manages the computer's memory and processes, as well as all of its software and hardware.
8_murik_8 [283]

Answer:

B. Computer operating system

Explanation:

the operating system (or OS) manages all of the hardware and software in the computer, and allows hardware and software to communicate.

We can also figure this out by process of elimination: Application software is just a fancy way to say apps, Graphical User Interface (or GUI) are menus that allow a user to use the computer through a visual representation (what you interact with using your mouse), and microcomputer just means a small computer like a laptop or a phone.

6 0
2 years ago
Your friend Luis recently was the victim of identity theft and has asked your advice for how to protect himself in the future. Y
antiseptic1488 [7]

Answer:

Firewall

Explanation:

Firewalls are mainly intended to protect an individual computer system or network from being accessed by an intruder, especially via the Internet. They thus work to prevent sabotage of the system and the theft or unauthorized viewing of private or sensitive data, such as through the use of spyware.

7 0
3 years ago
Which of the following can help organize your email messages? Select all that apply.
Dvinal [7]

Answer:

a

Explanation:

6 0
2 years ago
Read 2 more answers
Other questions:
  • Identify the four basic categories of hardware in a personal computer system
    7·1 answer
  • The Polish mathematician Wacław Sierpiński described the pattern in 1915, but it has appeared in Italian art since the 13th cent
    8·1 answer
  • HELP! ASAP I KNOW IT'S QUITE A HANDFUL BUT I NEED THIS ANSWER!!
    10·1 answer
  • SOLVE IN C:
    10·1 answer
  • Which decimal number is equivalent to this hexadecimal number?<br> F8
    6·2 answers
  • What is a number system, and what is the total number of digits used in this system called?
    5·1 answer
  • Windows Rights Management Services is used in conjunction with which Microsoft applications?
    11·1 answer
  • What is microsoft certification?
    8·1 answer
  • Discuss file Management<br>With relevant examples.<br>in a Computer?​
    8·1 answer
  • 10.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!