1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
podryga [215]
2 years ago
13

Consider the following method, which is intended to count the number of times the letter "A" appears in the string str.

Computers and Technology
1 answer:
sasho [114]2 years ago
7 0

The instruction that should replace /* missing code */ so that the method countA works as intended is (e)  str = str.substring(pos+1);

<h3>Methods</h3>

The program is an illustration of methods (or functions)

Methods are blocks of program statements that are executed when called or evoked

For the method to return the number of character A in a string, the loop body must check if the current character is A.

This is done using the substring method of a string

The syntax of this is: str.substring(pos + 1).

Where str represents the string, and pos + 1 represents the character index

Hence, the missing instruction is str = str.substring(pos+1);

Read more about methods at:

brainly.com/question/14284563

You might be interested in
If i cl/ear ch/at hist/ory on group/me on my comp.uter will it clear it on my phone
leonid [27]

Answer: It is likely that this can happen.

Explanation:

If you really want to go the extra mile to clear it all, I may recommend that you clear it off the phone as well. Hope this helps.

6 0
2 years ago
Read 2 more answers
Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first
irinina [24]

Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first acknowledgement is lost, but the second acknowledgement arrives before the timer for the first segment expires is True.

True

<u>Explanation:</u>

In network packet loss is considered as connectivity loss. In this scenario host A send two segment to host B and acknowledgement from host B Is awaiting at host A.

Since first acknowledgement is lost it is marked as packet lost. Since in network packet waiting for acknowledgement is keep continues process and waiting or trying to accept acknowledgement for certain period of time, once period limits cross then it is declared as packet loss.

Meanwhile second comes acknowledged is success. For end user assumes second segments comes first before first segment. But any how first segment expires.

3 0
3 years ago
WILL UPVOTE ALL plz
OverLord2011 [107]
D-ash is the answer.
8 0
3 years ago
Yo don't take this down just join this server you can say what ever
MrMuchimi

Answer:

Stop this and watch some prawns

4 0
3 years ago
Allie is working on the development of a web browser and wants to make sure that the browser correctly implements the Hypertext
Sophie [7]

Answer: World Wide Web Consortium (W3C)

Explanation:

World Wide Web Consortium(W3C) is known as the organization that establishes the standards and regulation for the World Wide Web(www).This platform is used for application development and setting the web guideline through which websites and web pages function.

  • According to the situation described in the question, Allie should concern with the World Wide Web Consortium (W3C) for getting the accurate and authentic information source.
  • Allie expects that browser developed by her should work perfectly along with HTML standards so W3C is the department for providing the correct guidelines and standards to any web browser.
6 0
3 years ago
Other questions:
  • ________ computers are specially designed computer chips that reside inside other devices, such as a car. Select one: A. Tablet
    11·2 answers
  • Which of the following is used to encrypt web application data?
    11·1 answer
  • Which animation effects allow text or images to show movement on a slide? Check all that apply. Entrance, Emphasis, Exit, Motion
    5·2 answers
  • To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for
    6·1 answer
  • The program is to be answered in Java Programming not C++ Please answer the following: Modify the BarChart program to accept the
    6·1 answer
  • What simple machine is most often used to lift the blinds on a window?
    8·2 answers
  • How do you know where the home row of the keyboard is?
    14·2 answers
  • Can anybody answer this
    11·1 answer
  • Implement A* graph search. A* takes a heuristic function as an argument. Heuristics
    5·1 answer
  • Why crt and plasma are not used in laptop ?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!