When referencing a substring such as str1[m:n] if m >= n then the value will be?

Answers

Answer 1

Answer: '' (An empty string)

Explanation:

Normally, when we are getting a substring, we will start from the character at index m and go until, but exclude the character at index n.

If m is greater than n, then we cannot get any substring as we would have to go backwards when we need to go forwards. If m=n, then we still cannot get any characters as we have to exclude the character at index n, making us have to exclude the character at index m as well.

Hence, for both situations the value would be an empty string, or a string with length 0.


Related Questions

Cloudy computing would like to be able to link related cases together. As the admin, what would you recommend?

Answers

As the admin of a cloud computing service, I would you recommend that you ensure the use of pooled resources and efficient client-time management.

What is cloud computing?

Cloud computing can be defined as a Cloud-based solutions that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives to provide various services to customers.

The types of cloud computing.

In Computer technology, there are three main types of cloud computing and these include the following:

Private cloudPublic cloudHybrid cloud

Basically, a hybrid cloud is designed and developed to combine the features of both a private cloud and public cloud. For instance, a hybrid cloud can be used by both the college's IT administrator and its IT consultant company which has access to the learning management system (LMS) application hosted in the cloud.

Read more on cloud computing here: brainly.com/question/17247526

#SPJ1

In which disclosure paradigm will dislosure potentially help both the attacker and defender?

Answers

Information sharing is a disclosure paradigm in which disclosure will potentially help both the attacker and defender.

What is vulnerability?

Vulnerability can be defined as any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker or a hacker, in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.

What is vulnerability disclosure?

Vulnerability disclosure can be defined as a practice that typically involves reporting any security flaw in an equipment, computer software, or hardware, so as to avert and mitigate a potential attack (threat).

The types of disclosure paradigm.

In Computer technology, there are four (4) main types of disclosure paradigm and these include the following:

Military: disclosure doesn't help the defender (low) but helps the attacker (high).Open source: disclosure helps the defender (high) but not the attacker (low).Information sharing: disclosure helps both the defender (high) and the attacker (high).Public domain: disclosure neither helps the defender (low) nor the attacker (low).

In this context, we can infer and logically deduce that the information sharing is a disclosure paradigm in which disclosure will potentially help both the attacker and defender such as when the CIA or FBI considers whether or not to share a sensitive information with officials in other agencies.

Read more on vulnerability here: brainly.com/question/25813524

#SPJ1

The database cannot be migrated to a different engine because sql server features are used in the application’s net code. The company wants to a?

Answers

Answer:

Explanation:

B is correct

What language choice will be the best for the website? 1. English only 2. Two languages: English and Chinese 3. Four languages: English, Chinese, Spanish, and Arabic You chose to redesign the company's website with minimal complexity. This turns out to be a smart move, as many countries must rely on slower Internet connections. Simple websites are more accessible in these areas with less available bandwidth. One option you take into consideration is whether to present the website content in multiple languages. You realize you won't be able to easily reconfigure the website for languages such as Arabic, which reads right to left instead of left to right, but that it might be worth it if the market is big enough. However, you can easily adapt the current site for languages more similar to English, such as Spanish.

Answers

The best language choice will be English only as it is known to be the language that is acceptable in every part of the world.

What is the most influential language in the world?

English is known to be the top and the most powerful language in all of the globe.

Note that  It is the dominant language that is made up of three G7 nations (such as the USA, UK and Canada), and also the British laid it foundation also as well as its global footprint.

Since it is often seen as  the world's lingua franca, it is therefore right to use it instead.

Hence, The best language choice will be English only as it is known to be the language that is acceptable in every part of the world.

Learn more about language from

https://brainly.com/question/10585737

#SPJ1

A____consists of many users and their information.​

Answers

Active Directory consist of many users and their information.

Answer:

Active Directory

Explanation:

Early computers took up entire rooms. which of these dramatically reduced the size of computers? microchips sound recording compact discs digital-video discs

Answers

Answer:

Micro chips

Explanation:

The evolution of computers to the modern day is made possible due to the micro chips or modern transistors or super efficient silicon integrated circuits The micro chips replaced the valves or vacuum tubes that made earlier computers have an enormous size.

Which Web application threat allows attackers to pass malicious code to different systems via a Web application

Answers

Answer:

An SQL Injection

Explanation:

Web applications are vulnerable to SQL injections which can happen when an unprotected form is linked to a critical database. The attacker can pass in malicious code through the form and modify or even delete the database.

what do u mean by generation of computers?

Answers

Answer:

Generation in computer terminology is a change in technology a computer is/was being used. Initially the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up am entire computer system.

Answer:

Explanation: Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.

General Electric saves $1.6 billion per year by using its private corporate network that links its 340,000 employees. Another name for this network that operates behind a firewall is a(n): Group of answer choices specialized network extranet intranet information system functional network

Answers

Based on the fact that General Electric uses its own private corporate network to link its 340,000 employees behind a firewall, this is called an Intranet.

What is an intranet?

An intranet refers to a network that functions like the internet but isn't available to everyone. It is instead available to only people who are part of the organization that set it up.

This intranet allows for its users to share information and communicate with each other using all sorts of tools and collaborative software.

Intranets operate behind a firewall which means that they are less prone to attacks by hackers and can be quite faster. This is what General Electric is doing with its employees which means it uses the intranet.

Find out more on an intranet at https://brainly.com/question/13742795

#SPJ1

You are a business consultant troubleshooting a failed information system. You discover that employees face negative incentives to using the system. Which component is causing the failure?

Answers

Given that the  employees face negative incentives to using the system the system component that is responsible for this failure can be said to be the people.

What is a component failure?

This is the term that is used to refer to the failure of a group of components at a particular period of time. This is usually the statistical probability of failure.

In a situation where the failure is due to the fact that the employees face negative incentives to using the system we can know the reason for such a failure is the people.

Read more on failure here: https://brainly.com/question/15949912

#SPJ1

You have a slicer and a chart on the same page for your sales data by state. If you use the menu to sort by territory in alphabetical order, what effect will that have on the slicer and the chart?

Answers

If a person is known to use the menu to sort by territory in alphabetical order, the effect will that have on the slicer and the chart is that The slicer will be sorted alphabetically.

What is meant by alphabetical order?

We  are known to be people who like to sort letters and words in a way that is alphabetical in nature.

This implies that one does this to order them as they are known to appear in the alphabet.

Hence, if sorting words in to alphabetical order, we often look at the first letter of the word and as such, If a person is known to use the menu to sort by territory in alphabetical order, the effect will that have on the slicer and the chart is that The slicer will be sorted alphabetically.

See full question below

You have a slicer and a chart on the same page for your sales data by state. If you use the menu to sort by territory in alphabetical order, what effect will that have on the slicer and the chart?

Select an answer:

Everything on the page will be sorted alphabetically by territory.

Only text items will be sorted alphabetically by territory, but chart items must be sorted separately.

The chart will be sorted alphabetically by territory, but the slicer will be unchanged.

The slicer will be sorted alphabetically by territory, but the chart will be unchanged.

Learn more about alphabetical order from

https://brainly.com/question/26971639

#SPJ1

A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy

Answers

Answer:

The answer is honeypot.

How is creating subclass of an existing class different from copying the code from the existing class to a new file?

Answers

The creating subclass of an existing class different from copying the code from the existing class to a new file because one involves  existing class while the other involves a new class.

What is superclass?

This is known to be creating a class, instead of  declaring completely new members, then a person often designate that the new class to inherit the members of an existing class - Uses Existing class.

What is subclass?

In the creating a class, instead of declaring what we call a completely new members, a person can designate that the new class to be able to inherit the members of an existing class. Uses  New class.

Hence, The creating subclass of an existing class different from copying the code from the existing class to a new file because one involves  existing class while the other involves a new class.

Learn more about subclass from

https://brainly.com/question/19260275

#SPJ1

You are the PC technician for a company. You received the following email from an employee:My email doesn't work. I keep getting email sent back to me, and I can't find any of my old emails. I don't think that the email program has ever worked well.When you arrive at the employee's desk, you observe how the employee accomplishes normal email tasks. You quickly determine that the problem is not with the email program, but that the employee needs to learn how to use the program. You have several high-priority tasks that need to be completed by the end of the day.What is the BEST way for you to respond

Answers

The the BEST way for you to respond is to set up a time where you as a person can sit down with the affected employee and show him how to carry out or complete the common tasks such as the email program.

What is the case about?

In the case that the email is not working, You as the technician need to meet up with the employee at a given time and show the person the ways and how to use the email program.

Note that teaching employees on how to use their email is not one's your biggest work but it is vital to do so.

Note that out rightly telling an employee that they do not know how to use a program in the right way is not respectful or helpful to them and thus The the BEST way for you to respond is to set up a time where you as a person can sit down with the affected employee and show him how to carry out or complete the common tasks such as the email program.

Learn more about PC technician from

https://brainly.com/question/13056638

#SPJ1

When computers sort data, they always use ____ values when making comparisons between values. group of answer choices numeric alphanumeric alphabetic ascending flag question: question 5

Answers

When computers sort data, they always use numeric values when making comparisons between values.

What is data sorting?

Data sorting is a process of data cleaning and it is done to have a good data. It involves arranging data in order of preference to give meaning. This is to understand the data and to help in good analysis.

It also help data scientist to deign a goods model of analysis for the data. Data can be sorted based on attached values or number or percentages.

Therefore, When computers sort data, they always use numeric values when making comparisons between values.

Learn more on data sorting below

https://brainly.com/question/584814

#SPJ1

Write a c program that asks the user to enter two numbers. the program should use the conditional operator to determine which number is the smaller and which is the larger

Answers

Using the knowledge in computational language in C++ it is possible to write a code that asks the user to enter two numbers. the program should use the conditional operator to determine which number is the smaller and which is the larger.

Writting in C++ code:

#include <iostream>

using namespace std;

int main(){

float a, b;

cout<<"Enter two numbers:";

cin>>a>>b;

if(a>b) {

cout<<"Larger Number:"<<a<<endl;;

cout<<"Smaller Number:"<<b;

}

else if(b<a){

cout<<"Larger Number:"<<b<<endl;

cout<<"Smaller Number:"<<a;

}else{

cout<<"Number are equal!"<<endl;

}

}

See more about C++ code at brainly.com/question/19705654

#SPJ1

CODE

#include <stdio.h>

int main() {

   // Variables

   int a, b;

   // User input

   printf("Enter a number: ");

   scanf("%d",&a);

   printf("Enter a number: ");

   scanf("%d",&b);

   // Conditional operators  

   (a>b)? (printf("%d is bigger than %d\n", a, b)) : (printf("%d is smaller than %d\n", a, b));

   (b>a)? (printf("%d is bigger than %d\n", b, a)) : (printf("%d is smaller than %d\n", b, a));

   

   return 0;

}

DISPLAY

Enter a number: 209

Enter a number: 190

209 is bigger than 190

190 is smaller than 209

EXPLANATION

Declare the variables a and b.

Ask the user to input two numbers.

Use conditional operators to check if a is smaller or bigger than b and b is smaller or bigger than a.

The python standard library's __________ module contains numerous functions that can be used in mathematical calculations.

Answers

The python standard library's math module contains numerous functions that can be used in mathematical calculations.

What is Python Programming?

This refers to the high-level language programming that writes code in a machine-readable format and the computer executes it based on the parameters of the python language.

Hence, we can see that this math module is useful when using the python programming language as it makes use of mathematical operations such as addition, subtraction, multiplication, etc.

Read more about python language here:

.https://brainly.com/question/27666303

#SPJ1

For the creation and implementation of new technologies, which of the following must always keep ethical principles in mind?

IT professionals

neither IT professionals nor government regulators

government regulator

both IT professionals and government regulators

Answers

For the creation and implementation of new technologies, both IT professionals and government regulators.

What are implementation technologies?

The implementation of new technologies in regards or within the concept of information technology (IT), is onw where the definition of implementation is made up of all the processes that occurs or takes place after the customer is said to have bought the product to get it operating properly.

Hence it is very vital that these processes such as analyzing requirements, installation  and configuration be followed in the right way.

Therefore, For the creation and implementation of new technologies, both IT professionals and government regulators.

Learn more about government regulators from

https://brainly.com/question/2034176

#SPJ1

Answer:

Both IT professionals and government regulators

Explanation:

We are creating a creation and implementation of new technologies

IT professionals are must requirements because they can help you to use the technology smartly.

Also Government should regulate this as if you do it with out their regulations It is taken as illegal work

Which application development model approaches software development as a continuous, changing process with never-ending versions, bug fixes, and enhancements?

Answers

A software application development model that typically approaches software development as a continuous, changing process that has bug fixes, never-ending versions, and enhancements is Agile.

What is SDLC?

SDLC is an abbreviation for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs.

What is Agile software development?

In Agile software development, the software development team are generally more focused on the continuous production of working (active) software programs with less effort on documentation while creating bug fixes and never-ending versions.

In this context, we can infer and logically deduce that a software application development model that typically approaches software development as a continuous, changing process that has bug fixes, never-ending versions, and enhancements is Agile.

Read more on software development here: brainly.com/question/26324021

#SPJ1

Please explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”

Answers

It means that there are people  who understand binary and those that do not understand it. That is, binary is said to be the way that computers are known to express numbers.

What is the joke about?

This is known to be a popular  joke that is often  used by people who are known to be great savvy in the field of mathematics.

The joke is known to be one that makes the point that a person is implying that the phrase is about those who only understands the decimal system, and thus relies on numbers in groups of 10.

The binary system is one that relies on numbers that are known to be  in groups of 2.

Therefore, If the speaker of the above phrase is one who is able to understand binary, that person  would  be able to say that that the phrase  is correctly written as  "there are 2 types of people that understand binary".

Learn more about binary from

https://brainly.com/question/21475482

#SPJ1

define the following: electronic mail, E-mail attachment, E-mail address, address book​

Answers

Answer:

Explanation:

electronic mailbox

a document, picture or  in an email

an address for your email : example at something . something

a book of email addresses

will you mark me as brainlest? I am trying to get a higher rank

Your organization stores highly sensitive data on-premises that cannot be sent over the public internet. The data must be processed both on-premises and in the cloud. What should your organization do

Answers

The best thing the organization can do to secure process data would be C. Order a Partner Interconnect connection with your network provider

What is Data Protection?

This refers to the steps and processes that are taken in order to protect the integrity of data in use from tampering.

Hence, we can see that based on the fact that your organization stores highly sensitive data on-premises that cannot be sent over the public internet. The data must be processed both on-premises and in the cloud, they would need to Order a Partner Interconnect connection with your network provider.  

Read more about data protection here:

https://brainly.com/question/27113550

#SPJ1

at what layer of the osi model does a network switch normally operate? a. layer 5 b. layer 3 c. layer 4 d. layer 2

Answers

Answer:

D. Layer 2

Explanation:

It is layer 2.

To learn more:

https://brainly.com/question/26299918?referrer=searchResults

Hope this helps!

explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”

Answers

It means that there are people  who understand binary and those that do not understand it. That is, binary is said to be the way that computers are known to express numbers.

What is the joke about?

This is known to be a popular  joke that is often  used by people who are known to be great savvy in the field of mathematics.

The joke is known to be one that makes the point that a person is implying that the phrase is about those who only understands the decimal system, and thus relies on numbers in groups of 10.

The binary system is one that relies on numbers that are known to be  in groups of 2.

Therefore, If the speaker of the above phrase is one who is able to understand binary, that person  would  be able to say that that the phrase  is correctly written as  "there are 2 types of people that understand binary".

Learn more about binary from

https://brainly.com/question/21475482

#SPJ1

14. How do digital libraries address the problem of digital exclusion?
O A. They allow web conferencing so people may connect with friends and relatives.
OB. They make it worse because digitally illiterate people are unable to read books.
O C. They reach out to people who need technology and help teach them digital literacy skills.
O D. They provide free virus protection to people who need it most.

Answers

The digital libraries address the problem of digital exclusion by: They reach out to people who need technology and help teach them digital literacy skills.

What does it mean to be digitally excluded?

The  digital exclusion  is known to be also as digital divide and this is known to be where a part of the population is known to possess a continuous and unequal access and capacity in regards to the use Information and Communications Technologies (ICT),

Note that IT are very essential for all to be fully participated  in the society and the digital libraries address the problem of digital exclusion by: They reach out to people who need technology and help teach them digital literacy skills.

Learn more about digital exclusion from

https://brainly.com/question/7478471

#SPJ1

How ICT has helped education to grow through progression?

Answers

Answer:

Hey there!

Explanation:

This is ur answer...

ICTs can enhance the quality of education in several ways: by increasing learner motivation and engagement, by facilitating the acquisition of basic skills, and by enhancing teacher training. ICTs are also transformational tools which, when used appropriately, can promote the shift to a learner-centered environment.

Hope it helps!

Brainliest pls!

Have a good day!^^

Anna is making a presentation on the top five most visited cities in her state. she wants to make sure that she does not put in too much information and slides on one city, and too little on another. which type of view in a presentation program will enable her to see the text of all the slides in the presentation? anna should use view to see the titles and text of all slides in the presentation.

Answers

Answer:

yea she should

Explanation:

The primary goal of a data _____ is to find answers to existing questions by creating insights from data sources.

Answers

The primary goal of a data analyst is to find answers to existing questions by creating insights from data sources. Data analyst is the person who engages in a process of inspecting, cleansing, transforming, and modelling data with the goal of discovering useful information, informing conclusions, and supporting decision-making.

What is a data?

In the pursuit of knowledge, data is a collection of discrete units of information in a conceptual model that in their most basic forms convey quantity, quality, fact, statistics, or other basic units of meaning. A datum is one item in a set of data.

Therefore, the correct answer is as given above

learn more about data: https://brainly.com/question/24621985

#SPJ1

Ricky unplugs his amazon alexa smart speaker when he is not using it. he's trying to limit unnecessary _____.

Answers

Ricky unplugs his amazon alexa smart speaker when he is not using it. he's trying to limit unnecessary data collection.

What are data collections?

Data collection is the process of gathering and measuring information on variables of interest, in an established systematic fashion that enables one to answer stated research questions, test hypotheses, and evaluate outcomes.

Data may be grouped into four main types based on methods for collection: observational, experimental, simulation, and derived.

See more about data collection at brainly.com/question/20389933

#SPJ1

A major hospital uses an agile approach to manage surgery schedules. a large board set up in a common office allows staff to quickly identify which procedures are scheduled, the times they are scheduled, and who is involved. which method is described in this scenario?

Answers

In this scenario, the Agile approach (method) that is being used and described is referred to as Kanban.

What is SDLC?

SDLC is an abbreviation for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs.

What is Agile software development?

In Agile software development, the software development team are more focused on producing efficiently and effectively working software programs with less effort on documentation.

In this scenario, we can infer and logically deduce that the Agile approach (method) that is being used and described is referred to as Kanban because it necessitates and facilitates real-time capacity communication among staffs, as well as complete work openness.

Read more on software development here: brainly.com/question/26324021

#SPJ1

Complete Question:

A major hospital uses an Agile approach to manage surgery schedules. A large board set up in a common office allows staff to quickly identify which procedures are scheduled, the times they are scheduled, and who is involved. Which method is described in this scenario?

A. Journey

B. Mapping

C. Waterfall

D. Kanban

E. Sprint

F. I don't know this ye

Other Questions
Marcus loves baseball and wants to create a home plate for his house. Marcus needs to calculate the area of the home plate at the ball field so he can reconstruct it when he gets home. Calculate the area of the polygon.72.5 in275.5 in283 in296 in2 What does the new abortion law state?And why is abortion important? Evaluate each of the following 1: -21 7 Study island math pls helpppI will love you if you answer suppose you are working in non government organisation fighting against child labour for trafficking in Nepal what can you do to rehabilitate the traffic goes through your organisation prepare a plan Given: y varies directly as x squared and inversely as z cubed. If y = 12 when x = 4 and z = 2, find x when y = 1.728 and z = 5.Select one:a. x=6b. x=18c. x=27d. x=36 How did the hypothesis that emotional perception would interact with job performance in reading? oQ: Which of the following best describes the social situation for African Americans immediately after the Civil War?Select one:a. all of these are correct.b. There were many social and political inequalities that African Americans had to confront.c. Many newly freed slaves had to find a situation in which they could earn a living.Over 4 million African Americans were freed from slavery. Calculate the perimeter and area of this shape.Perimeter = Currently digby is paying a dividend of $19. 67 (per share). if this dividend were raised by $3. 64, given its current stock price what would be the dividend yield? Translate the phrase into a variable expression. Use the letter d to name thevariable. If necessary, use the asterisk (*) for multiplication and the slash(/) for division.the number of dollars Paul owes minus 18...Answer here Removing a specific group of trees within a small area over a long period of time is _______. a. clearcutting b. seed tree cutting c. group selection d. single tree selection please select the best answer from the choices provided a b c d Recent research on predictors of heart disease suggests that people who are ________ are particularly vulnerable to cardiac problems. formal letter about disciplined Legal intoxication means not having __________ of your mental and physical faculties. Abc corp. stock has been holding at $22. 50 for a few months. stockholder nguyen is willing to sell call options at $23. investor dudek buys the call options. who is guaranteed to come out ahead? If a random variable is characterized by (infinitely) uncountable values within any interval, it is known as ________ variable What is the correct term for images of a person in prayer with outstretched arms? What is a key difference between erikson's psychosocial development and loevinger's ego development? Drag the tiles to the correct boxes to complete the pairs. identify the type of money used for each transaction. chris bought a bagel with coins issued by the government. karen bought a bike by exchanging it for her silver receipt. luke paid six apples for two dozen eggs. representative money arrowright commodity money arrowright fiat money arrowright