how to Write a simple Java socket programming that a client sends a text and server receives and print.
Answer:
Java Socket programming is used for communication between the applications running on different JRE.
Java Socket programming can be connection-oriented or connection-less.
Socket and ServerSocket classes are used for connection-oriented socket programming and DatagramSocket and DatagramPacket classes are used for connection-less socket programming.
The client in socket programming must know two information:
IP Address of Server, and
Port number.
Here, we are going to make one-way client and server communication. In this application, client sends a message to the server, server reads the message and prints it. Here, two classes are being used: Socket and ServerSocket. The Socket class is used to communicate client and server. Through this class, we can read and write message. The ServerSocket class is used at server-side. The accept() method of ServerSocket class blocks the console until the client is connected. After the successful connection of client, it returns the instance of Socket at server-side.
Explanation:
Creating Client:
import java.io.*;
import java.net.*;
public class MyServer {
public static void main(String[] args){
try{
ServerSocket ss=new ServerSocket(6666);
Socket s=ss.accept();//establishes connection.
DataInputStream dis=new DataInputStream(s.getInputStream());
When an application contains just one version of a method, you can call the method using a(n) ____ of the correct data type.
Answer:
Parameter
Explanation:
q: When an application contains just one version of a method, you can call the method using a(n) ____ of the correct data type.
a: Parameter
The part of the computer that provides access to the Internet is the
Answer:
MODEM
Explanation:
convert FA23DE base 16 to octal
kxjhdjshdjdjrhrjjd
snsjjwjsjsjjsjejejejd
s
shsjskkskskskekkes
slskekskdkdksksnsjs
djmsjs
s JM jsmsjjdmssjsmjdjd s
jsmsjjdmssjsmjdjd
HS shhsys
s
s
sujdjdjd s
sujdjdjd
syshdhjdd
Answer:
764217360
Explanation:
Describe how keyboard software works and which problems does keyboard software
need to handle?
Answer:
The target computer's operating system and gain unauthorized access to the hardware, hook into the keyboard with functions provided by the OS, or use remote access software to transmit recorded data out of the target computer to a remote location.
No physical sensation of pressing a button results in misfires. Lack of physical divisions between keys makes touch typing impossible. Smaller key spacing results in typos.
what is the data type name for integer?
Answer:
the data type name for integer is int
Hope This Helps!!!
Explanation:
the integer data type ( int ) is used to represent whole numbers that can be stored within 32-bits. The big integer data type ( bigint ) is used to represent whole numbers that are outside the range of the integer data type and can be stored within 64 bits.what is Microsoft word
Answer:
A software where you can document letters, essays or anything really.
Explanation:
How many fingers do you need to type floor
Answer:
About 0-1 fingers at minimum
Explanation:
you can type with your toes/elbow as well. Any body part really.
To type the word "floor" on a regular keyboard layout, you would generally need six fingers: three on your left hand and three on your right.
Your index finger (usually used for the "F" key) on your left hand would be utilised for the letter "f." Your middle finger (which is normally used for the "D" key) would be utilised for the letter "l."
Finally, your ring finger (which is normally used for the "S" key) would be utilised for the letter "o."
Your index finger (usually used for the "J" key) on your right hand would be utilised for the letter "o." Your middle finger (which is normally used for the "K" key) would be utilised for the second letter "o."
Finally, your ring finger (which is normally used for the "L" key) would be utilised for the letter "r."
Thus, on a typical keyboard layout, you would type the word "floor" with three fingers from each hand.
For more details regarding Keyboard layout, visit:
https://brainly.com/question/17182013
#SPJ6
Write a recursive function that calculates the sum 11 22 33 ... nn, given an integer value of nin between 1 and 9. You can write a separate power function in this process and call that power function as needed:
Answer:
The function in Python is as follows:
def sumDig(n):
if n == 1:
return 11
else:
return n*11 + sumDig(n - 1)
Explanation:
This defines the function
def sumDig(n):
This represents the base case (where n = 1)
if n == 1:
The function returns 11, when it gets to the base case
return 11
For every other value of n (n > 1)
else:
This calculates the required sum recursively
return n*11 + sumDig(n - 1)
g 1-4 Which piece of network hardware breaks a network up into separate collision domains within a single broadcast domain
Answer:
A switch
Explanation:
A local area network (LAN) refers to a group of personal computers (PCs) or terminals that are located within the same general area and connected by a common network cable (communication circuit), so that they can exchange information from one node of the network to another. A local area network (LAN) is typically used in small or limited areas such as a set of rooms, a single building, school, hospital, or a set of well-connected buildings. Some of the network devices or equipments used in a local area network (LAN) includes an access point, personal computers, a hub, a router, printer, a switch, etc.
In computer networking, a switch is a network hardware (device) that breaks up a network into separate collision domains within a single broadcast domain. Thus, it's commonly configured with virtual local area network (VLAN) to break up and interconnect multiple networks.
Which devices are managed through device management?
Device management is the process of managing
________devices.
Answer:
organization
Explanation:
The answer is organization I am thinking.
I need the SQL statements for these questions:
1. For each reservation, list the reservation ID, trip ID, customer number, and customer last name. Order the results by customer last name.
2. For each reservation for customer Ryan Goff, list the reservation ID, trip ID, and number of persons.
3. List the trip name of each trip that has Miles Abrams as a guide.
4. List the trip name of each trip that has the type Biking and that has Rita Boyers as a guide.
5. For each reservation that has a trip date of July 23, 2016, list the customer’s last name, the trip name, and the start location.
6. List the reservation ID, trip ID, and trip date for reservations for a trip in Maine (ME). Use the IN operator in your query.
7. Repeat Exercise 6, but this time use the EXISTS operator in your query.
8. Find the guide last name and guide first name of all guides who can lead a paddling trip. (Note: The query results should include duplicate values.)
Here are the tables:
CUSTOMER FIRST NAME POSTAL CODE CUSTOMER NUM LAST NAME ADDRESS Northfold Liam 9 Old Mill Rd Londonderry 10 NH 03053 103 Kasuma Sujata 132 Main St. #1 East Hartford CT 06108 MA 01854 Goff 164A South Bend Rd. Lowell Ryan 105 McLean Kyle 345 Lower Ave. Wolcott NY 14590 106 Morontoia Joseph 156 Scholar St Johnston 02919 107 Marchand Quinn 76 Cross Rd Bath NH 03740 108 32 Sheep stop St Edinboro PA Rulf Usch 16412 109 Caron Jean Luc 10 Greenfield St Rome ME 04963 110 Martha York Bers 65 Granite St NY 14592 112 Jones Laura 373 Highland Ave. Somerville MA 02143 115 Nu Adam 1282 Ocean Walk Ocean City Vaccari 08226 116 Murakami Iris 7 Cherry Blossom St. Weymouth MA 02188 119 Londonderry vT Chau 18 Ark Ledge Ln Clement 05148 120 Gernowski Sadie 24 stump Rd. Athens ME 04912 121 Cambridge VT Bretton-Borak Siam 10 Old Main St 122 Hefferson orlagh 132 South St. Apt 27 Manchester NH 03101 123 25 Stag Rd Fairfield Barnett Larry 06824 124 Busa Karen 12 Foster St. South Windsor CT 06074 125 51 Fredrick St Albion Peterson Becca NY 14411 126 Brown Brianne 154 Central St Vernon CT 06066 PHONE Click to Add 603-555-7563 413-555-3212 860-555-0703 781-555-8423 585-555-5321 401-555-4848 603-555-0456 814-555-5521 207-555-9643 585-555-0111 857-555-6258 609-555-5231 617-555-6665 802-555-3096 207-555-4507 802-555-3443 603-555-3476 860-555-9876 857-555-5532. 585-555-0900 860-555-3234
Answer:
Explanation:
/* From the information provided, For now will consider the name of table as TRIPGUIDES*/
/*In all the answers below, the syntax is based on Oracle SQL. In case of usage of other database queries, answer may vary to some extent*/
1.
Select R.Reservation_ID, R.Trip_ID , C.Customer_Num,C.Last_Name from Reservation R, Customer C where C.Customer_Num=R.Customer_Num ORDER BY C.Last_Name
/*idea is to select the join the two tables by comparing customer_id field in two tables as it is the only field which is common and then print the desired result later ordering by last name to get the results in sorted order*/
2.
Select R.Reservation_ID, R.Trip_ID , R.NUM_PERSONS from Reservation R, Customer C where C.Customer_Num=R.Customer_Num and C.LAST_NAME='Goff' and C.FIRST_NAME='Ryan'
/*Here, the explaination will be similar to the first query. Choose the desired columns from the tables, and join the two tables by equating the common field
*/
3.
Select T.TRIP_NAME from TRIP T,GUIDE G,TRIPGUIDES TG where T.TRIP_ID=TG.TRIP_ID and TG.GUIDE_NUM=G.GUIDE_NUM and G.LAST_NAME='Abrams' and G.FIRST_NAME='Miles'
/*
Here,we choose three tables TRIP,GUIDE and TRIPGUIDES. Here we selected those trips where we have guides as Miles Abrms in the GUIDES table and equated Trip_id from TRIPGUIDES to TRIP.TRIP_Name so that can have the desired results
*/
4.
Select T.TRIP_NAME
from TRIP T,TRIPGUIDES TG ,G.GUIDE
where T.TRIP_ID=TG.TRIP_ID and T.TYPE='Biking' and TG.GUIDE_NUM=G.GUIDE_NUM and G.LAST_NAME='Boyers' and G.FIRST_NAME='Rita'
/*
In the above question, we first selected the trip name from trip table. To put the condition we first make sure that all the three tables are connected properly. In order to do so, we have equated Guide_nums in guide and tripguides. and also equated trip_id in tripguides and trip. Then we equated names from guide tables and type from trip table for the desired results.
*/
5.
SELECT C.LAST_NAME , T.TRIP_NAME , T.START_LOCATION FROM CUSTOMER C, TRIP T, RESERVATION R WHERE R.TRIP_DATE='2016-07-23' AND T.TRIP_ID=R.TRIP_ID AND C.CUSTOMER_NUM=R.CUSTOMER_NUM
/*
The explaination for this one will be equivalent to the previous question where we just equated the desired columns where we equiated the desired columns in respective fields and also equated the common entities like trip ids and customer ids so that can join tables properly
*/
/*The comparison of dates in SQL depends on the format in which they are stored. In the upper case if the
dates are stored in the format as YYYY-MM-DD, then the above query mentioned will work. In case dates are stored in the form of a string then the following query will work.
SELECT C.LAST_NAME , T.TRIP_NAME , T.START_LOCATION FROM CUSTOMER C, TRIP T, RESERVATION R WHERE R.TRIP_DATE='7/23/2016' AND T.TRIP_ID=R.TRIP_ID AND C.CUSTOMER_NUM=R.CUSTOMER_NUM
*/
6.
Select R.RESERVATION_ID, R.TRIP_ID,R.TRIP_DATE FROM RESERVATION R WHERE R.TRIP_ID IN
{SELECT TRIP_ID FROM TRIP T WHERE STATE='ME'}
/*
In the above question, we firstly extracted all the trip id's which are having locations as maine. Now we have the list of all the trip_id's that have location maine. Now we just need to extract the reservation ids for the same which can be trivally done by simply using the in clause stating print all the tuples whose id's are there in the list of inner query. Remember, IN always checks in the set of values.
*/
7.
Select R.RESERVATION_ID, R.TRIP_ID,R.TRIP_DATE FROM RESERVATION WHERE
EXISTS {SELECT TRIP_ID FROM TRIP T WHERE STATE='ME' and R.TRIP_ID=T.TRIP_ID}
/*
Unlike IN, Exist returns either true or false based on existance of any tuple in the condition provided. In the question above, firstly we checked for the possibilities if there is a trip in state ME and TRIP_IDs are common. Then we selected reservation ID, trip ID and Trip dates for all queries that returns true for inner query
*/
8.
SELECT G.LAST_NAME,G.FIRST_NAME FROM GUIDE WHERE G.GUIDE_NUM IN
{
SELECT DISTINCT TG.GUIDE_NUM FROM TRIPGUIDES TG WHERE TG.TRIPID IN {
SELECT T.TRIP_ID FROM TRIP T WHERE T.TYPE='Paddling'
}
}
/*
We have used here double nested IN queries. Firstly we selected all the trips which had paddling type (from the inner most queries). Using the same, we get the list of guides,(basically got the list of guide_numbers) of all the guides eds which were on trips with trip id we got from the inner most queries. Now that we have all the guide_Nums that were on trip with type paddling, we can simply use the query select last name and first name of all the guides which are having guide nums in the list returned by middle query.
*/
Given the code as follows: main() { int i = 3, n; float x; x = i; n = 8 % x; } What problem will occur? Group of answer choices A compilation error will occur. A run time error will occur. An inheritance error will occur. No problem will occur at all.
Answer:
A compilation error will occur.
Explanation:
The % operator does not accept a float as its right-hand operand.
how an operating system allocates system resources in a computer
Answer:
The Operating System allocates resources when a program need them. When the program terminates, the resources are de-allocated, and allocated to other programs that need them
A technician needs to manage a Linux-based system from the GUI remotely. Which of the technician should the technician deploy
Complete Question:
A technician needs to manage a Linux-based system from the GUI remotely. Which of the following technologies should the technician deploy?
A. RDP
B. SSH
C. VNC
D. Telnet
Answer:
Managing a Linux-based System from the GUI Remotely
The technology that the technician should deploy to manage the Graphic User Interface (GUI) remotely is:
C. VNC
Explanation:
VNC stands for Virtual Network Computing. This computing technology enables a remote user to access and control another computer to execute commands. It acts as a cross-platform screen-sharing system and is used to remotely access and control another computer. VNC makes a computer screen, keyboard, and mouse available to be seen and used from a remote distance. The remote user does everything from a secondary device without being in front of the primary computer or device. An example of a good VNC is TeamViewer.
Which of the following terms describes an attacker walking or driving through business areas and neighborhoods to identify unprotected wireless networks from the street using a laptop or a handheld computer?
A. Wi-Fi stealing.
B. Wi-Fi trolling.
C. Wi-Fi jacking.
D. Wi-Fi hacking.
Answer:
C. Wi-Fi jacking
Explanation:
Answer: yessir b
Explanation:
While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access?
Answer:
Bro this is my area the answer is WPA2 and AES
Explanation:
its because AES is a more secure encryption protocol introduced with WPA2. AES isn't some creaky standard developed specifically for Wi-Fi networks, either. It's a serious worldwide encryption standard that's even been adopted by the US government.
There are many possible variations in wireless network design depending on the surroundings.
What is wireless network?Even in a complicated single site, different wireless networks running on the same hardware as part of the broader wireless LAN environment can have different network configuration fundamentals needed for a successful deployment.
At the same time, a number of essential network configuration activities are part of any successful wireless project's typical chores. Let's look at the broad and specific procedures that wireless experts should take while setting up enterprise-grade Wi-Fi networks.
Therefore, There are many possible variations in wireless network design depending on the surroundings.
To learn more about wifi, refer to the link:
https://brainly.com/question/6145118
#SPJ5
The conversion rate would be the highest for keyword searches classified as Group of answer choices buyers grazers researchers browsers
Answer:
buyers
Explanation:
Search engine optimization (SEO) can be defined as a strategic process which typically involves improving and maximizing the quantity and quality of the number of visitors (website traffics) to a particular website by making it appear topmost among the list of results from a search engine such as Goo-gle, Bing, Yah-oo etc.
This ultimately implies that, search engine optimization (SEO) helps individuals and business firms to maximize the amount of traffic generated by their website i.e strategically placing their website at the top of the results returned by a search engine through the use of algorithms, keywords and phrases, hierarchy, website updates etc.
Hence, search engine optimization (SEO) is focused on improving the ranking in user searches by simply increasing the probability (chances) of a specific website emerging at the top of a web search.
Typically, this is achieved through the proper use of descriptive page titles and heading tags with appropriate keywords.
Generally, the conversion rate is mainly designed to be the highest for keyword searches classified as buyers because they're the main source of revenue for a business and by extension profits.
Database multiple-choice question don't bs pls
Which of the following is not a common factor for database management system selection?
a. Cost
b. Features and tools
c. Software requirements
d. Hardware requirements
e. All of the above
f. None of the above
(D and F are wrong)
Answer:
f. None of the above
Explanation:
Considering the available options, the right answer is option F "None of the above."
Common factors for database management system selection are the following:
1. Cost: various DBMS vendors have different pricing, hence, interested buyers will consider the price before selections
2. Features and Tools: different types of DBMS have varied features and tools in carrying out the work.
3. Software requirements: there are various software requirements in various DBMS, such as encryption support, scalability, application-level data recovery, etc.
4. Hardware requirement: various DBMS vendors have different hardware requirements to consider, such as sizeable RAM, CPU value, etc.
Hence, in this case, the correct answer is option F.
Explain why you want a USB hub if there are already USB ports in the computer.
Answer:
Powered USB hubs provide their own power supply for devices. Typically, when you connect a device to your computer via USB, the device draws upon your computer's power to function. Powered USB hubs come with their own power source and provide power for your connected devices so your computer doesn't have to.
Explanation:
Please Mark me brainliest
Select the correct statement(s) regarding decentralized (distributed) access control on a LAN. a. no centralized access process exists, and therefore each connected station has the responsibility for controlling its access b. data collisions are possible, therefore mechanisms such as CDMA/CD are required c. when a data collision occurs, the nearest station detecting the collision transmits a jamming signal d. all of the above are correct
Answer: D. all of the above are correct
Explanation:
The correct statements regarding the decentralized (distributed) access control on a LAN include:
• no centralized access process exists, and therefore each connected station has the responsibility for controlling its access
• data collisions are possible, therefore mechanisms such as CDMA/CD are required
• when a data collision occurs, the nearest station detecting the collision transmits a jamming signal.
Therefore, the correct option is all of the above.
Write a function int checkBalance(char exp[]); that can take an expression as input and check whether the parenthesis used in that expression are valid or invalid. It returns 1 if it is valid, and returns 0 if it is not valid.For example, the following expressions are valid: [ A * {B (C D)}] and [{()()}]The following expressions are invalid: [ A * {B (C D})], [ { ( ] ) ( ) }
Answer:
Explanation:
The following code is written in Java. It uses for loops to loop through the array of characters, and uses IF statements to check if the symbols in the expression are balanced. If so it returns true, otherwise it breaks the function and returns false. Two test cases have been provided in the main method and the output can be seen in the attached image below.
import java.util.ArrayList;
class Brainly {
public static void main(String[] args) {
char[] exp = { '[', 'A', '*', '{', 'B', '(', 'C', 'D', ')', '}', ']'};
char[] exp2 = {'[', 'A', '*', '(', 'C', '}', ']'};
System.out.println(checkBalance(exp));
System.out.println(checkBalance(exp2));
}
public static boolean checkBalance(char exp[]) {
ArrayList<Character> symbols = new ArrayList<>();
for (char x: exp) {
if ((x =='[') || (x == '{') || (x == '(')) {
symbols.add(x);
}
if (x ==']') {
if (symbols.get(symbols.size()-1) == '[') {
symbols.remove(symbols.size()-1);
} else {
return false;
}
}
if (x =='}') {
if (symbols.get(symbols.size()-1) == '{') {
symbols.remove(symbols.size()-1);
} else {
return false;
}
}
if (x ==')') {
if (symbols.get(symbols.size()-1) == '(') {
symbols.remove(symbols.size()-1);
} else {
return false;
}
}
}
return true;
}
}
Using Python suppose an array sorted in ascending order is rotated at some pivot unknown to you beforehand. (i.e., [0,1,2,4,5,6,7] might become [4,5,6,7,0,1,2]).
You are given a target value to search. If found in the array return its index, otherwise return “The input is not on this list”
You may assume no duplicate exists in the array.
Hint: Use a function. Use the built in method .index( ) and/or for loops.
Answer:
Explanation:
class Solution {
public int search(int[] nums, int target) {
int n = nums.length;
int low = 0 , high = n - 1;
While(low < high){//Set virtual node
int mid = (low + high) / 2;
if(nums[mid] > nums[high]){
low = mid + 1;
}else{
high = mid;
}
}
int rot = low;
low = 0;
high = n - 1;
while(low <= high){
int mid = (low + high) / 2;
Int real = (mid + rot) % n;//The virtual node is mapped to the real node.
if(nums[real] == target){
return real;
}else if(nums[real] < target){
low = mid + 1;
}else{
high = mid - 1;
}
}
return -1;
}
}
Why is OS important in every data processing system?
Please Answer Fast!
Answer:
Functions of an operating system. An operating system provides three essential capabilities: It offers a UI through a CLI or GUI; it launches and manages the application execution; and it identifies and exposes system hardware resources to those applications -- typically, through a standardized API.
Explanation:
For the following 4-bit operation, assuming these register are ONLY 4-bits in size, which status flags are on after performing the following operation? Assume 2's complement representation. 1010+0110
a) с
b) Z
c) N
Answer:
All flags are On ( c, z , N )
Explanation:
Given data:
4-bit operation
Assuming 2's complement representation
Determine status flags that are on after performing 1010+0110
1 1
1 0 1 0
0 1 1 0
1 0 0 0 0
we will carry bit = 1 over
hence C = 1
given that: carry in = carry out there will be zero ( 0 ) overflow
hence V = 0
also Z = 1
But the most significant bit is N = 1
????????????????????????? ???????????????
Answer:
sorry, I don't know what that is
what type of slab and beam used in construction of space neddle
Answer:
Pyramidal Space Frame Glamorizes Swimming Pool 15. News Briefs 16 ... to use every pound of steel with no sacrifice in safety or ... form of steel trusses in an inverted coni- ... be embedded in the concrete slab when.
Explanation:
I HOPE THIS HELPS
Briefly explain what an array is. As part of your answer make use of a labelled example to show the declaration and components of an array
Answer:
Explanation:
In programming an array is simply a grouping of various pieces of data. Various data elements are grouped together into a single set and saved into a variable. This variable can be called which would return the entire set which includes all of the elements. The variable can also be used to access individual elements within the set. In Java an example would be the following...
int[] myArray = {33, 64, 73, 11, 13};
In Java, int[] indicates that the variable will hold an array of integers. myArray is the name of the variable which can be called to access the array elements. The elements themselves (various pieces of data) are located within the brackets {}
write a script to check command arguments. Display the argument one by one (use a for loop). If there is no argument provided, remind users about the mistake.
Answer and Explanation:
Using Javascript programming language, to write this script we define a function that checks for empty variables with if...else statements and then uses a for loop to loop through all arguments passed to the function's parameters and print them out to the console.
function Check_Arguments(a,b,c){
var ourArguments= [];
if(a){
ourArguments.push(a);}
else( console.log("no argument for a"); )
if(b){
ourArguments.push(b);}
else( console.log("no argument for b"); )
if(c){
ourArguments.push(c);}
else( console.log("no argument for c"); )
for(var i=0; i<ourArguments.length; i++){
Console.log(ourArguments[i]);
}
}
Can we update App Store in any apple device. (because my device is kinda old and if want to download the recent apps it aint showing them). So is it possible to update???
Please help
Answer:
For me yes i guess you can update an app store in any deviceI'm not sure×_× mello ×_×