1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mamaluj [8]
2 years ago
7

Write a program that removes all non-alphabetic characters from the given input.

Computers and Technology
1 answer:
Mila [183]2 years ago
3 0

Answer:

hotdog and decor is he really really appreciate it and decor and I will send it out to me to go back to school today and decor is he still is he going and I will be done by then to khow about the election results and decor and decor and decor and decor and decor and I have a goodt to you eat

good idea to go back to khow about the election results and decor is he still in the one and I will

You might be interested in
You are part of the team assigned to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results obtained fro
Ad libitum [116K]

There are different kinds of software implementation strategy. The software implementation strategy would you recommend in this situation to allow users fall-back access to the old system as the new one is implemented is parallel start up.

  • Parallel running often called parallel start up strategy for system changeover where a new system slowly takes over the roles of the older system even when both systems operate.

This conversion often occur when the technology of the old system is outdated and as such a new system is needed to be installed to replace the old one.

The parallel running phase is the act of changing a fragment of business information technology operation to a new system.

Learn more about Parallel start up from

brainly.com/question/9343211

7 0
2 years ago
What type of printer heats toner to adhere it to the paper? inkjet . impact. 3D. laser.
Luden [163]

Answer:

laser

Explanation:

These are well known printer types now.  Let's review how they work to determine in which does heat plays a role.

inkjet: inkjet printers are printer throwing ink at the paper in the form of little drops.  No heat involved here.

impact: That's the oldest technology, where a printing head is moving left and right to punch a printing ribbon and transfer ink onto the paper.  No heat involved.

3D: 3D printers don't usually use paper... as they use other materials to create a 3D representation of a model.  Heat is involved in the melting of the material before it's placed on the building model.  But no paper involved here.

laser: laser printers are working very much like a photocopier machine... memorizing the pattern to be printed, then transferring it onto paper... using heat.

8 0
3 years ago
An object reference provides a(an)______for an object and is used to gain access to the object (Points : 2) entry
sdas [7]

Answer: Instance

Explanation: Instance is the term found in the object-orient programming concept. It is used for the realization of the variation present in any object specifically.The program execution at each time instant is known as the instance of program. Generation of realized instance is known as instantiation.

This helps in the accessing of the object in the program.Other options are incorrect entry , target and handle are not the technical term related with the accessing of object .Thus the correct answer is instance.

3 0
3 years ago
What are the limits of hashing and verifying that files haven’t changed?
earnstyle [38]

The hashing function can take any number of key-value pairs and there is no specific limit to it.

<h3>What is hashing?</h3>

Hashing is a file-based algorithm for producing a fixed-length bit string value. A file is essentially a collection of data blocks. The length of the data is reduced by hashing to a fixed number or key that represents the original string.

When hashing is employed, the hash function may plot all of the keys and values to what the real size of the table is, demonstrating that the hashing function can take any number of key-value pairs with no restriction.

However, if the passwords are hashed in encryption, recovering the passwords is extremely difficult.

Thus, the hashing function can take any number of key-value pairs and there is no specific limit to it.

Learn more about the hashing here:

brainly.com/question/13106914

#SPJ1

5 0
2 years ago
Which of the following is not a storage medium?
GarryVolchara [31]

Answer:

microphone

Explanation:

when you are using a microphone once it stop it done

8 0
3 years ago
Read 2 more answers
Other questions:
  • From the Start screen, you can A. access recently opened Excel workbooks. B. create a document from a template. C. create new bl
    12·2 answers
  • Jeff needs to apply a theme and change the font of the theme in the presentation that he is making. Put the steps in the order t
    14·1 answer
  • What do the letters of the su command stand for? what can you do with su besides give yourself root privileges? "what can you do
    5·1 answer
  • Declare an array named tax rates of five elements of type double and initialize the elements (starting with the first) to the va
    12·1 answer
  • A single-user database system automatically ensures ____ of the database, because only one transaction is executed at a time.
    13·1 answer
  • Rhea has been asked to interview the new CEO of an energy company. She has scheduled a meeting with him in the company’s meeting
    9·2 answers
  • Write a program that takes a list of integers as input. The input begins with an integer indicating the number of integers that
    8·1 answer
  • How many people are in Siver, on the game Valorant?
    14·1 answer
  • Microsoft Access is a
    10·1 answer
  • What are 2 ways computers can connect to a network?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!