1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Varvara68 [4.7K]
3 years ago
5

Which of the following is not a standard method called as partof the JSP life cycle?

Computers and Technology
1 answer:
rusak2 [61]3 years ago
6 0

Answer:

jspService()

Explanation:

<u></u>

<u>These are the steps in JSP life cycle</u>

1. We have to convert JSP page to Servlet.

2.Then we compile the JSP page which convert it into test.java

3. In test.java ,we load the classes(test.class) in container.

4. Object(instance) is created in container .

5. Then, we initialize the init() method at the time of servlet generation.  

6. After the initialization,for the requests we use _jspService() method to serve the incoming requests from JSP.

7. When the work of JSP is completed, we remove it from container by the help of jspDestroy() method.

There is no jspService() method in the JSP life cycle.

You might be interested in
Blair is the director of information systems at a marketing firm. She creates a set of guidelines that dictate everything an emp
gizmo_the_mogwai [7]

Answer:

data

Explanation:

Because i said so

4 0
3 years ago
An enhancement to a computer accelerates some mode of execution by a factor of 10. The enhanced mode is used 50% of the time, me
Ann [662]

Answer:

The answer is "5.5 and 90.90%"

Explanation:

For point 1:

To calculate the speed from fast mode, its run time without enhancement should be worked out. Designers are aware of which two selves are implicated throughout the accelerated project planning: the empty (50 \%) and the increased stages (50 \%).

Although not enhanced, this would take almost as long (50 \%) and for the combine to give phase; even so, the increased phase would've been 10 times longer, as well as 500 \%. Thus the corresponding total speed without enhancement is =50\% + 500\% = 550\%.

Its overall speed is:

=\frac{\text{Accelerated runtime}}{ \text{accelerated  runtime}} = \frac{550 \%}{ 100 \%}= 5.5

For point 2:

We re-connect these figures in Amdahl's Law throughout order to identify how long it would take for both the initial implementation:

\text{Vectorized fraction}= \frac{\text{Overall velocity}\times \text{Accelerated acceleration}-\text{Accelerated acceleration}}{\text{Overall acceleration} \times \text{Accelerated acceleration}-\text{Overall acceleration}}

                              = \frac{5.5  \times 10 -10 }{ 5.5 \times 10 - 5.5}\\\\=\frac{45}{49.5}\\\\=0.9090\\\\=90.90\%

5 0
2 years ago
¿Cuales son las empresas mas exitosas que aún usan hoja de cálculo? porfa es urgentee
dem82 [27]

Answer:excel

Explanation:

6 0
2 years ago
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
How do you make a ringtone on earsketch
RoseWind [281]

Haven't used earsketch, but here we go.

Answer:

1). Make a track in earsketch, make it like 6/7 seconds

2.) export your track as an .mp3, .wav, or  .ogg (your choice!)

3.) (If on android) Navigate to settings, now search for an entry for ringtone.

4.) If you have no luck, look up how to set ringtone on your desired phone brand (iOS, Android, etc.)

5.) Test out your new ringtone

6.)Profit

4 0
2 years ago
Other questions:
  • The ____ command displays the last 10 lines of a text file.
    5·1 answer
  • A colleague asks you to research a CPU for a new server that will run Windows Server 2019. He explains the server roles that he
    7·1 answer
  • Computer software licensed under exclusive legal right of the copyright holder with the intent that the licensee is given the ri
    6·1 answer
  • Which small-group format would be most appropriate for the following situation? A large sporting event is coming to town. Key me
    14·2 answers
  • To save a file so that it can be opened on most computers, select the ____ option.
    10·2 answers
  • Which process centers the spreadsheet's content on the page?
    15·1 answer
  • An F-1 ____________ may be authorized by the DSO to participate in a curricular practical training program that is an__________
    8·1 answer
  • Implement a function called merge that does the following in C#:
    7·1 answer
  • Tornado Alley is located in the middle of the United States, extending from Texas up through the Dakotas. The above statement is
    6·1 answer
  • Encryption is an important topic in math and computer science. It keeps your personal information safe online.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!