Answer:
python:
x = input()
print(len(x))
Explanation:
the most important keyboard instrument of the romantic period was the
Answer:
piano
Explanation:
which type of broadband internet offers connections nearing the speed of light?
Answer:
FiberOptic connections
Explanation
One of the fastest data transfer methods for computers.
The type of broadband internet that offers connections near the speed of light is fiber-optic. The correct option is c.
What is fiber-optic?Information can be sent from one location to another via optical fiber. Communications over the internet, cable television broadcasts, and telephone calls all use it.
Data transmission through the internet is one typical application. Most likely, a fiber optic cable connecting my computer and Brainly's servers to your browser allowed it to obtain this webpage.
Fiber optics is used in communications, medicine, optical inspection, lighting, and in the making of sensors. The Internet is a connection of computers from different places without wires. It is transferring information.
Therefore, the correct option is c. fiber-optic.
To learn more about fiber-optic, refer to the link:
https://brainly.com/question/10062531
#SPJ2
The question is incomplete. Your most probably complete question is given below:
Cable.
DSL.
fiber-optic.
satellite.
most file managers include a way to create a folder through the save dialog box. true or false?
Answer:
false because most of the file managers just keep Everything organized by dates, years, and everything like that
Explanation:
Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times the character appears in the phrase. Ex: If the input is: n Monday the output is: 1 Ex: If the input is: z Today is Monday the output is: 0 Ex: If the input is: n It's a sunny day the output is: 2
Answer:
import java.io.*;
public class Main {
public static void main(String[] args) throws IOException {
BufferedReader in = new BufferedReader(new InputStreamReader(System.in));
String s;
while ((s = in.readLine()) != null) {
int total = 0;
for (char character : s.toCharArray()) {
if (s.charAt(0) == character) {
total++;
}
}
System.out.println(total - 1);
}
}
}
Explanation:
We start the program by using the BufferedReader which will allow input from the user.
Then, we create a variable String that will take the input from the user.
Since the problem is asking us for the total number of times that the specified character appeared in the String, we will have to iterate over that String and count every time the character is found.
For this, I initialized an integer variable total, that takes count every time the character is found.
Using a for each loop, I converted the string to a character array (e.g. instead of a String "Monday", it will now look like {"M", "o", "n", "d", "a", "y"). It will iterate for each character it finds and checks if the character at position 0 is the same as the character at position i.
If the condition is true, then the total will increment by one.
But the problem is, since we converted the string into a character array to validate each character, the initial character will also add to the sum. So for "n Monday", it will take the first n, and add the total + 1.
Without specifying total - 1, "n Monday" will output 2 since there are two total "n".
There is a limitation, which wasn't specified in the problem statement anyway, but it's good to be aware of in case you need to solve it. If you want to check all of the characters that must equal the character you want to validate, irrespective of upper or lowercase, you will have to convert the string to lowercase first, so that the program will take the uppercase letters into account as well.
For that, before the for each statement, simply add s = s.toLowerCase();
Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to verify and sign digital certificates for the company. They are looking for an option where, even in the absence of a CA, other CAs can issue the certificates. Additionally, they are also looking for CAs who will overlook other CAs in different locations. In such a scenario, which PKI trust model should they use
PKI trust model that should be used, is a distributed trust model.
A distributed trust is a trust model that gives power to different source while taking the power away from a single source and thereafter, shares that responsibility to the wide range of sources. It is important as it allows trust to flows through network, marketplaces and forums. With the use of this distributed trust model, Sigma Technology can have multiple CAs in different locations to work on behalf of the company. And even if one is absence, other CAs can still issue certificate without any hindrances.Conclusively, we can say that PKI trust model that should be used is a distributed trust model.
Learn more from:
https://brainly.com/question/14837773
in classification problems, the primary source for accuracy estimation of the model is ________.
Answer:
In classification problems, the primary source for accuracy estimation is the confusion matrix (or classification matrix or contingency table)
True or False: Visual Studio is not a part of Unity. You could use a different code editor to edit your C# scripts if you wanted to.
Answer:
True
Explanation:
Visual Studio and Unity are two different things. Visual Studio is an IDE developed by Microsoft, and Unity is a game engine developed by another company. Visual Studio is the default editor in Unity, but you are able to use something different.
Source: https://docs.unity3d.com/Manual/ScriptingToolsIDEs.html
There are different kinds of true statement. Visual Studio is not a part of Unity is a true statement.
Is Visual Studio a part of Unity?Visual Studio is known to for Mac Tools and also for Unity is said to be part of the installation of Visual Studio for Mac.You can verify the type of Visual Studio differs for Mac and other product.
Learn more about Visual Studio from
https://brainly.com/question/4925305
aaron has started a food blog on which he wants to post his recipes. he wants to place a high-quality image next to each cooking step. which file format should he use so that users do not experience a lag when loading the high-quality images on the website?
The picture format which should be embraced on Aaron's blog in other to ensure that customers have smooth viewing experience while also preserving the quality of uploaded images is the JPEG format.
File format refers to the manner in which files are encoded. Picture files have several encoding types such as JPEG, JPG, GIF, PNG and so on.
Since, Aaron is considering images which loads quickly without lagging, then he'll need to compress the size of the uploaded images so that they have smaller file sizes.
In other to preserve image quality while working down the size of the image, the JPEG image format, produced good quality images with smaller file sizes compared to other file formats.
Therefore, the file format which should be adopted by Aaron ls the JPEG picture format.
Learn more :https://brainly.com/question/24941137
why does messenger keep saying waiting for network
you prob need to fix your data or redownload it again
What is LinkedIn?
A job search website
A virtual job fair
A recruiter website
Answer:
A job search website.
Explanation:
________ is the use of information technology to support the sharing of content among networks of users.
Answer:
The social media is the use of IT to support the sharing of content among network of users.
did someone actually hang themselves on the wizard of oz set
No - its a rumour started since the films 50th anniversary in 1989.
Hey is anyone else getting this? Don't mind the answer.
Answer:
Getting what? I don't get what you mean.
excuse me i am going into my A levels and i need help in picking what further pure mathematic units i need to pick since i am studying ICT.
Answer:
i dont know bout math units but subjects for ict include
microcomputer technology, and systems resource management ,computer systems organization.
Explanation:
What types of games became popular in the 90s? List three games and how they had evolved from their successful 80s video game rivals.
Answer:
Doom (1993) Half Life (1998) Super Mario 64 (1997)
Explanation:
Doom and Half-Life were PC games.
Doom was an early 90s PC shooter that was "3d" it wasn't actually 3d but it used a unique rendering system to make it look 3d. It was a level to level shooter that also included secrets
Half-Life was a Actual 3D game and required quite a beefy Graphics card in your computer at the time to run it smoothly, It was a long story-driven game
Super Mario 64 was one of the first "True 3D" games on Home console because it was a launch title for the brand new N64 It utilized the hardware for a brand new experience for console players.
Most 80s games were even more primitive and were either Hosted in arcade cabinets at your local Arcade Such as Outrun (1986) (Btw great soundtrack!) or the NES that allowed you to play the Original few Mario games that were all 2D.
So one of the biggest Evolutions in 80s to 90s gaming is the introduction of 3D titles being able to run on good computers in the early 90s and home consoles could also run 3D titles at the end of the 90s
Pls, mark Brainliest I put my heart and soul into this. Very fun Question!!!
What appealed to people and especially kids of the 70s and 80s about gaming?
What parts of early gameplay, and which aspects of the games are still relevant today?
What are the major aspects in which gaming has improved since then?
question 1- it appealed as the ultimate playthings and competed to master them and set the high score, or the record for longest time playing.
question 2- Gameplay is arguably the most important aspect of a game. You can have breathtaking graphics and an enthralling storyline, but if the main game mechanics the player will be performing aren't fun, your project may as well have been a movie.
question 3- Gaming is really a workout for your mind disguised as fun. Studies have shown that playing video games regularly may increase gray matter in the brain and boost brain connectivity. (Gray matter is associated with muscle control, memories, perception, and spatial navigation.)
hope this helps :)
did someone hang themselves on set of wizard of oz
No - its a rumour that has been going around since the films 50th anniversary in 1989.
what is the name of the method of problem solving that breaks a problem imto smaller problems
Answer:
The first thing that came to mind was when my parents tell me "Take it one step at a time" I hope this helps
Explanation:
Which device do you think is the most important in the development of human civilization
Answer: The most important characteristic for the development of a civilization is the presence of advanced cities because they were centers of trade, which established economies and allowed for further development of the civilizations.
Explanation:
Your welcome :)
what is the difference between internal and external css?
Answer:
Internal CSS are the ones that we can write within the same file i.e the HTML code and CSS code are placed in the same file.
External CSS is that we can write in a separate file than the HTML code i.e the HTML file is separate like(index.html) the CSS file is separate like(style.css).
Explanation:
The light in a room must be turned on when there is one or more person in the room and turned off the rest of the time. A sensor is used to detect if there is someone in the room. Describe the use of a microprocessor to control the light in the room.
Answer:
ZOO WEE MAMA
Explanation:
ZOO WEE MAMA 23
cookies that remain on your device indefinitely are called
Answer:
Persistent Cookies: Persistent cookies stay on the user's browsing device until the user clears them or until they reach their expiration. Persistent cookies are those that retain information on the user's specific preferences so that we can provide a “personalized” user experience.
Explanation:
I hope that this helps, if you have anymore questions, please, feel free to ask. I hope that you have an amazing rest of your day. ;D
Cookies that remain on your device indefinitely are called persistent cookies.
What are persistence cookies?Cookies that remain on your device indefinitely are called persistent cookies.
These cookies are stored on the user's device even after the browser is closed, and can be used to track the user's activity over time.
We have,
Persistent cookies:
It can be useful for storing information such as login credentials or user preferences, as they allow the user to remain logged in or have their preferences saved between browsing sessions.
However, they can also be used for tracking and advertising purposes, which has raised concerns about online privacy and security.
Many web browsers offer options for managing cookies, including the ability to delete or block persistent cookies.
Users can also use browser extensions or privacy tools to control how cookies are used on their devices.
Thus,
Cookies that remain on your device indefinitely are called persistent cookies.
Learn more about persistent cookies here:
https://brainly.com/question/29608733
#SPJ5
Why do we collect feedback on the code we write?
Answer:
to improve our code
Explanation:
"To improve our code" we collect feedback on the code we write.
Collecting feedback helps the users to learn whatever your consumers think approximately company reputation, performance, as well as merchandise or their items.Going beneath their basic likes as well as their dislikes and assisting you in understanding and evaluating wherever you may grow and where the business position in comparison to your competition.
Thus the above answer i.e., "option a" is correct.
Learn more about feedback here:
https://brainly.com/question/1603365
did someone really hang themselves on wizard of oz
Which of the following behaviors does not harm a company if your employment is terminated?
getting a copy of word-processing software before leaving
selling trade secrets to competing companies or to your future employer
creating a username and password so you can access company information after you have left
notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave
Answer:
Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.
Explanation:
Trying to grab a copy of your work software can harm the company by potentially creating a security risk. There can still be residual files left by the company left in the software, and any virus or hackers that access your computer can find those files or connect to the company's cloud network.
Selling trade secrets will not only be bad for the company once your employment is terminated, but can actually lead to job termination itself because with those secrets out, competing companies can make identical products of the same (or better) quality for less money, which could result in a loss of profits or even going out of business. This is why non-disclosure agreements exist.
If you can still access company information even after you leave, this poses a security threat to the company because you can then sell that information to other companies or leak it online for everyone to see. Even if you don't do it yourself, a virus or hacker lurking on your computer would be more than happy to do it for you. That information could also be personal payment or identifying information of employees and clients/customers, which could cause people to lose trust in the company.
The best thing to do to avoid facing these consequences and protect other people's information is to turn over your accounts and any information you have of the company and allow them to revoke your access to that information. This not only helps the company remain secure and profitable, but you also won't have to possibly deal with law enforcement and have fewer job opportunities as a result.
Answer:
D. Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.
Explanation:
one Q what will be the answer?
Answer: a computer system that has one function within a large system
Explanation:
the key word here is EMBEDDED which means WITHIN SOMETHING ELSE
An HTML sitemap provides a list of internal links on a website accessible to users
Describe the type of gameplay seen during early video games
Answer:
2d?
Explanation:
It could be 2D because most games such as early Mario and Donkey Kong games were 2D games.
Answer: Arcade Machines
The earliest gameplay video games were arcade machines such as Mario, Donkey Kong, and PacMan. Most early video games being produced by Nintendo.
1 of 10
The biggest difference between scholarships and loans is that
scholarships are considered _____ but loans must be paid back.
easy money
liquid assets
free money
sound investments
Answer:
free money
Explanation:
scholarship money you can keep and do what you please with it. its not really easy money since its actually difficult to get scholarships, and the other ones dont make sense because how do you invest in a scholarship? theyre not liquid assets either
After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identified security vulnerabilities
grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities
A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.Conclusively we can therefore say that the hacker was a gray hat hacker.
Learn more from
https://brainly.com/question/15899195