Identify the hardware components in your own computer. If you don't have a computer, use a friend's, or one at work or in an NVCC lab. The following list shows the components you should identify and how to find the information on a Windows computer. Describe model computer: type (laptop, desktop, notebook, tablet, etc.) Indicate your manufacturer (HP, Apple: iPad, MacBook Air, etc., Lenovo, Dell, etc.) of the computer. Input devices (include internal and external devices) - they usually have a model name and number somewhere on the device. Output devices (include internal and external devices) - they usually have a model name and number somewhere on the device. Storage devices (include internal and external devices, and how much data each can hold) - Open Windows Explorer and right click on a drive name to open its properties. Amount of RAM - Open System Properties in the Windows Control Panel. Type and speed of CPU - Open System Properties in the Windows Control Panel. Ports (number and type) - Look for jacks into which a connector can be plugged on the front, back and sides of the machine. Compare the jacks to pictures in your textbook.

Answers

Answer 1

Solution :

A friend of mine have an old version of computer PC having the following components :

Input devices

Model name of the keyboard -- PUNTA , model number -- P-KB515

Model name of the mouse -- PUNTA, model number -- P-KB515

Output devices

Speaker : COMPAQ

Monitor : ACER,  Model Number  --- EB192Q

Storage : 500 MB capacity hard disk

RAM : 2 GB

Processor : Intel Pentium dual E1260 at the rate 1.80 GHz

It is provided with audio jacks


Related Questions

What do application in productivity suites have in common

Answers

Answer:

The function of the suites application is to create presentations and perform numerical calculations.

Explanation:

S.B. manages the website for the student union at Bridger College in Bozeman, Montana. The student union provides daily activities for the students on campus. As website manager, part of S.B.'s job is to keep the site up to date on the latest activities sponsored by the union. At the beginning of each week, he revises a set of seven web pages detailing the events for each day in the upcoming week. S.B. would like the website to display the current day's schedule within an aside element. To do this, the page must determine the day of the week and then load the appropriate HTML code into the element. He would also like the Today at the Union page to display the current day and date.Complete the following:Use your editor to open the bc_union_txt.html and bc_today_txt.js files from XX folder. Enter your name and the date in the comment section and save them as bc_union.html and bc_today.js. DONEGo to the bc_union.html file in your editor. Directly above the closing tag, insert a script element that links the page to the bc_today.js file. Defer the loading of the script until after the rest of the page is loaded by the browser. Study the contents of the file and save your changes. DONEGo to the bc_today.js file in your editor. At the top of the file, insert a statement indicating that the code will be handled by the browser assuming strict usage. Note that within the file is the getEvent() function, which returns the HTML code for the daily events at the union given a day number ranging from 0 (Sunday) to 6 (Saturday). "use strict";Declare the thisDate variable containing the Date object for the date October 12, 2018. var thisDate = new Date("October 12, 2018");Declare the dateString variable containing the text of the thisDate variable using local conventions. var dateStr = thisDate.toLocaleDateString();Declare the dateHTML variable containing the following text string

date where date is the value of the dateString variable. var dateHTML = "" + dateStr + "

";Create the thisDay variable containing the day of the week number from the thisDate variable (Hint: use the getDay() method). - confused here, have: var thisDate = thisDate.getDay(); correct?Using the thisDay variable as the parameter value, call the getEvent() function to get the HTML code of that day's events and store that value in a variable named eventHTML. - lost here...Applying the insertAdjacentHTML() method to the page element with the ID unionToday, insert the value of the dateHTML plus the eventHTML variables before the end of the element contents. - again, lost here too. Found this on another site... document.querySelector('#unionToday').insertAdjacentHTML('beforeend',dateHTML +' '+ eventHTML); -- Where do I put it?Document your code with descriptive comments."use strict"; /* #4 pg680 *//* New Perspectives on HTML5 and CSS3, 7th Edition Tutorial 9 Case Problem 2 */ This script uses the getEvent() function to return the HTML code containin the daily events at the Bridger College student union. *//*Display the Current Date*/var thisDate = new Date("October 12, 2018"); var dateStr = thisDate.toLocaleDateString(); /* Display the Date Using Local Conventions as a Header*/var dateHTML = "

" + dateStr + "

"; /* Display the Day of the Week Number*/var thisDate = thisDate.getDay(); // #8 Correct???/* Display the Event Listings */function getEvent(day) { var eventHTML = day[thisDay]; /* is adding this correct?? = day[thisDay]; part of #9 ??? */ switch (day) { case 0: // Sunday Events eventHTML = " \ Highlights from the Bridger Art Collection \

An exhibition from over 60 items in the BC permanent collection.

\

Location: Room A414

\

Time: 12 am – 4 pm

\

Cost: free

\ \ Bridger Starlight Cinema \

Recent, diverse, and provocative films straight from the art house. 35mm.

\

Location: Fredric Whyte Play Circle

\

Time: 7 pm – 10 pm

\

Cost: $3.75 MWU students, Union members, Union staff. $4.25 all others

\ \ "; break; case 1: // Monday Events eventHTML = " \ Monday Billiards \

Play in the BC Billiards league for fun and prizes

\

Location: Union Game Room

\

Time: 7 pm – 11 pm

\

Cost: $3.75 for registration

\ \ Distinguished Lecture Series \

Cultural critic Elizabeth Kellog speaks on the issues of the day.

\

Location: Union Theater

\

Time: 7 pm – 9 pm

\

Cost: free, seating is limited

\ \ "; break;

Answers

Answer:

hi

Explanation:

i did not known answers

What is the name given to software that decodes information from a digital file so that a media player can display the file? hard drive plug-in flash player MP3

Answers

Answer:

plug-in

Explanation:

A Plug-in is a software that provides additional functionalities to existing programs. The need for them stems from the fact that users might want additional features or functions that were not available in the original program. Digital audio, video, and web browsers use plug-ins to update the already existing programs or to display audio/video through a media file. Plug-ins save the users of the stress of having to wait till a new product with the functionality that they want is produced.

Answer:

B plug-in

Explanation:

Edge2022

In a relational database, the three basic operations used to develop useful sets of data are:_________.
a. select, project, and join.
b. select, project, and where.
c. select, from, and join.
d. select, join, and where.

Answers

In a relational database, the three basic operations used to develop useful sets of data are:

[tex]\sf\purple{a.\: Select, \:project,\: and\: join. }[/tex]

[tex]\large\mathfrak{{\pmb{\underline{\orange{Mystique35 }}{\orange{❦}}}}}[/tex]

The basic operations used to develop useful sets of data in relational database are Select, Project and Join.

The Select and Project are of important use in selecting columns or attributes which we want to display or include in a table.

The join function allows the merging of data tables to form a more complete and all round dataset useful for different purposes.

Hence, the basic operations are select, project, and join.

Learn more : https://brainly.com/question/14760328

Clocks (also called timers) are essential to the operation of any multiprogrammed system. They maintain the time of day, and prevent one process from monopolizing the CPU. How are clocks implemented

Answers

Answer:

The answer is below

Explanation:

The clock in the CPU is made of three elements including the following:

1. Crystal oscillator

2. A counter

3. A holding register

All these clock elements combined and generate interrupts at known periods or duration.

However, the clock has a powered battery back up which is implemented with a form of low-power circuitry similar to that of digital watches.

The purpose is to prohibit the current time from being failed when the computer is powered off or shut down.

我对汉语的兴趣 làm đoạn văn theo đề trên​

Answers

Answer:

which language is this

Explanation:

Chinese or Korea

what is said to be the first mechanical calculator​

Answers

Answer:

Pascaline, also called Arithmetic Machine, the first calculator or adding machine to be produced in any quantity and actually used. The Pascaline was designed and built by the French mathematician-philosopher Blaise Pascal between 1642 and 1644.

Explanation: hope that helps

Pascaline, also called Arithmetic Machine.

HEYYY! you're probably a really fast typer can you please type this for me! i tried copying and pasting it but it wouldn't let me!!! sooo can you please be a dear and kindly type it for me ^^

what i want you to type is directly in the image so please type exactly that

i dunno what subject this would be under so i'll just put it in any

Answers

Answer:

here you go. wish you a great day tomorrow.

and in fact,computer science is somewhat the right category

Abstract art may be - and may seem like - almost anything. This because, unlike the painter or artist who can consider how best they can convey their mind using colour or sculptural materials and techniques. The conceptual artist uses whatever materials and whatever form is most suited to putting their mind across - that would be anything from the presentation to a written statement. Although there is no one kind or structure employed by abstract artists, from the late 1960s specific tendencies emerged.

LAB: Winning team (classes)
Complete the Team class implementation. For the class method get_win_percentage(), the formula is:
team_wins / (team_wins + team_losses)
Note: Use floating-point division.
Ex: If the input is:
Ravens
13
3
where Ravens is the team's name, 13 is the number of team wins, and 3 is the number of team losses, the output is:
Congratulations, Team Ravens has a winning average!
If the input is Angels 80 82, the output is:
Team Angels has a losing average.
------------------------------------------------------------------------------------------------------------------------------------
We are given:
class Team:
def __init__(self):
self.team_name = 'none'
self.team_wins = 0
self.team_losses = 0
# TODO: Define get_win_percentage()
if __name__ == "__main__":
team = Team()
team_name = input()
team_wins = int(input())
team_losses = int(input())
team.set_team_name(team_name)
team.set_team_wins(team_wins)
team.set_team_losses(team_losses)
if team.get_win_percentage() >= 0.5:
print('Congratulations, Team', team.team_name,'has a winning average!')
else:
print('Team', team.team_name, 'has a losing average.')
Please help, in Python!

Answers

Answer:

The function is as follows:

def get_win_percentage(self):

       return self.team_wins / (self.team_wins + self.team_losses)

Explanation:

This defines the function

def get_win_percentage(self):

This calculates the win percentage and returns it to main

       return self.team_wins / (self.team_wins + self.team_losses)

See attachment for complete (and modified) program.

Answer: def get_win_percentage(self):

Explanation: got it right on edgen

Which orientation style has more height than width?

Answers

Answer:

"Portrait orientation" would be the correct answer.

Explanation:

The vertical picture, communication as well as gadget architecture would be considered as Portrait orientation. A webpage featuring portrait orientation seems to be usually larger than large containing lettering, memo abases as well as numerous types of content publications.One such volume fraction also becomes perfect for impressionism depicting an individual from either the top.

Thus the above is the correct answer.

You've decided to build a new gaming computer and are researching which power supply to buy. Which component in a high-end gaming computer is likely to draw the most power

Answers

Answer:

Following are the solution to the given question:

Explanation:

In this order, it is typically the GPU and CPU. The most important way to consider is to look at the details of the components to enhance watts. Add up to 100 watts so make sure it was safe and ok. Just buy a PSU with an extra 100 watts of leeway for your system. This is indeed a slight price difference.

HELP ITS A TESTTT!!!Which symbol shows auto correct is in use?

A-a white light bulb
B-A green plus sign
C-A flashing red circle
D-A yellow lightning bolt

Answers

After careful consideration the answer to this problem looks to be D

Answer:

D

Explanation:

Tạo thủ tục có tên _Pro04 để trả về số lượng tổng thời gian tham gia dự án Y của nhân viên có mã số X, với X là tham số đầu vào, Y là tham số đầu ra

Answers

Answer:

nigro

Explanation:

What are interpersonal skills for non-technical user

Answers

Answer:Non-Technical Skills ('NTS') are interpersonal skills which include: communication skills; leadership skills; team-work skills; decision-making skills; and situation-awareness skills.

Explanation:

this can provide illusion of fast movement it is often used in videos to censor information for security or density​

Answers

Answer:

Blurring can provide the optical illusion of a fast movement. It is often used in videos to hide sensitive or age-inappropriate information, the protection of identities (hence security) or just to provide decency.

Explanation:

Mostly used during animated videos where unlike (real videos) the blur does not occur naturally, the blur is used to make speed believable. Speed invigorates, and highlights intensity. Blurring still images can help to make more realistics motions of speed. An example where lots of blurring is used as prostproduction effects is in Flash.

Cheers

What type of editor is used to edit HTML code?What type of editor is used to edit HTML code?

Answers

For learning HTML we recommend a simple text editor like Notepad (PC) or TextEdit (Mac).

mark me brainliestt :))

Answer:

If you want to use HTML editor in windows, you can use notepad. And if you want to use HTML editor on your phone than you need to install any editor on your phone.

Explanation:

If you want to use another app than notepad in pc, laptop, mac, OS or Linux, you can download a editor known as Visual Studio Code. If you want to do another language you can also do it in it. You can do all programming languages in it.

Suppose now there are 80 pairs of flows, with ten flows between the first and ninth rack, ten flows between the second and tenth rack, and so on. Further suppose that all links in the network are 10 Gbps, except for the links between hosts and TOR switches, which are 1 Gbps.

Required:
a. Each flow has the same data rate; determine the maximum rate of a flow.
b. For the same traffic pattern, determine the maximum rate of a flow for the highly interconnected topology.
c. Now suppose there is a similar traffic pattern, but involving 20 hosts on each rack and 160 pairs of flows. Determine the maximum flow rates for the two topologies.

Answers

Answer:

Explanation:

Given that:

The no of flow pairs = 80

Each link's capacity = 10 Gbps

Link capacity amongst TOR switches and hosts = 1 Gbps

Because each connection is distributed among all flows, each flow crossing the same link distributes the link's capacity with the other flows. The connection capacity needed by each flow in the network is determined by the highest flow rate.

Maximum rate flow = [tex]\dfrac{link's \ capacity}{no \ of \ flow \ pairs}[/tex]

[tex]= \dfrac{10 \ Gbps}{80}[/tex]

Since 1 Gbps = 1000 Mbps

[tex]= \dfrac{10000}{80}[/tex]

= 125 Mbps

Hence, maximum rate flow = 125 Mbps

b.

Each switch at Tier-1 is connected to each and every switch at Tier-2 in the highly integrated structural topology. As a result, there are n-disjoint routes between tier-2 and tier-1 switches.

Number of paths between tier-1 and tier-2 is 4, thus, there exist four paths from tier-1 switch to tier 2.

The capacity whereby all data routes convey is determined by the maximum rate of flow.  

number of available paths = 4  

Each link's capacity = 10 Gbps

Maximum flow rate = 4 × 10 Gbps

Maximum flow rate = 40 Gbps

c.

Because each connection is distributed between all flows, each flow crossing a similar link distributes the link's capacity with other flows.

number of flow pairs = 160

Each link's capacity = 10 Gbps

maximum rate of flow = 10000 Mbps / 160

= 62.5 Mbps

For 160 flow pairs, maximum flow rate = 62.5 Mbps

Each switch in Tier-1 communicates with each switch in Tier-2 in the highly linked topology network. As a result, n-disjoint routes between tier-2 and tier-1 switches are possible. As there exist 20 hosts engaged in the network around each host, the number of routes from either a tier-1 switch or tier-2 switches is 20.

here;

no of paths = 20

each link's capacity = 10 Gbps

Maximum flow rate = 20 × 10  

= 200 Gbps

As such, with 160 pairs of flow, maximum flow rate = 200 Gbps

create slider in wordpress

Answers

Answer:

Adding a WordPress Slider in Posts/Page

Open the post editor, select the location where you want to add the slider, and click on the Add Slider button next to the media uploader. You will see boxes for each slider you have created. Choose the slider you want to insert and then click Insert Slider button.

Question 1
The decimal number system problem solving question
Statement: Several digits '8' are written and some '+" signs are interested
to get the sum 1000. Figure out how it is done.​

Answers

Answer:

888 + 88 + 8 + 8 + 8 = 1000

Explanation:

Required

Add up to 1000 using only digit 8

There is no straight way to answer this question; so, we make use of trial by error method to arrive at our solution.

After several trials, I found out that:

888 + 88 + 8 + 8 + 8 = 1000

Which of followings are true or false?

a. Swapping two adjacent elements that are out of place removes only one inversion.
b. Any algorithm that sorts by exchanging adjacent elements requires O(n log n)
c. Shellsort with a proper distance function is faster than mergesort for a very large input (like sorting 1 billion numbers).
d. The average-case performance of quick sort is O(NlogN), but the best-case performance of quick sort is O(N) for a pre-sorted input.
e. The number of leaves in a decision tree for sorting n numbers by comparisons must be 2n.
f. The height of a decision tree for sorting gives the minimum number of comparisons in the best case.
g. Any decision tree that can sort n elements must have height Big-Omega (n log n).
h. Bucket-sort can be modeled by a decision tree.

Answers

Answer:

Explanation:

a. Swapping two adjacent elements that are out of place removes only one inversion.

Answer: True

b. Any algorithm that sorts by exchanging adjacent elements requires O(n log n)

Answer: False

c. Shellsort with a proper distance function is faster than mergesort for a very large input (like sorting 1 billion numbers).

Answer: True

d. The average-case performance of quick sort is O(NlogN), but the best-case performance of quick sort is O(N) for a pre-sorted input.

Answer: True

e. The number of leaves in a decision tree for sorting n numbers by comparisons must be 2n.

Answer: False

f. The height of a decision tree for sorting gives the minimum number of comparisons in the best case.

Answer: True

g. Any decision tree that can sort n elements must have height Big-Omega (n log n).

h. Bucket-sort can be modeled by a decision tree.

Answer: True

What is the function of hard disk Which Computer was the first Computer to be developed​

Answers

Answer:

The hard disk is a storage device designed to permanently store data, being secondary to the software in the computer. The ENIAC was the first modern computer to be developed and built, completing construction in 1946 and taking three years to build, but if ancient computers (people who computed by hand) are factored in, then the first computer would be way back in time, perhaps even extending to the B.C. years.

Explanation:

Hope this helped!

9- Which type of view is not present in MS
PowerPoint?
(A) Extreme animation
(B) Slide show
(C) Slide sorter
(D) Normal

Answers

Answer:

A.Extreme animation

hope it helpss

Design a function int maxDigit (int num) to find and return the greatest digit from the arguments value num.
Also write a function void result() by passing parameters to print the greatest digit.
please tell in java programming​

Answers

Answer:

Below is the required JAVA Code:

Explanation:

public static int largestDigit(int n) {

   if (n < 0) {

       return largestDigit(-1 * n);

   } else if (n == 0) {

       return 0;

   } else {

       int digit = n % 10;

       int maxDigit = largestDigit(n / 10);

       if (digit > maxDigit)

           maxDigit = digit;

       return maxDigit;

   }

}

\color{red}Method\;tested\;in\;a\;complete\;java\;program\;if\;you\;are\;interested.

public class LargestDigitRecursive {

   public static int largestDigit(int n) {

       if (n < 0) {

           return largestDigit(-1 * n);

       } else if (n == 0) {

           return 0;

       } else {

           int digit = n % 10;

           int maxDigit = largestDigit(n / 10);

           if (digit > maxDigit)

               maxDigit = digit;

           return maxDigit;

       }

   }

   public static void main(String[] args) {

       System.out.println(largestDigit(14263203));

       System.out.println(largestDigit(845));

       System.out.println(largestDigit(52649));

       System.out.println(largestDigit(3));

       System.out.println(largestDigit(0));

       System.out.println(largestDigit(-573026));

       System.out.println(largestDigit(-2));

   }

}

OUTPUT:

6

8

9

3

0

7

2

Telecommunications and software development are examples of information technology careers.
True
False

Answers

Answer:

True

Explanation:

Information technology may be described as the use of systems to aid application designs capable of sending and receiving information and building a communication pathway for individuals and companies. It also involves retrieving, storing large chunks of information and organizational data usually in databases to fast track the seamless functioning of the organization's system. The information technology ecosystem is very broad from those charged with ensuring effective communication such as telecommunications platforms and those who build and develop technologies for effective communication and data storage. Hence, both Telecommunications and software development are examples of information technology careers.

What two benefits are a result of configuring a wireless mesh network? Check all that apply.
1. Performance
2. Range
3. WiFi protected setup
4. Ad-hoc configuration​

Answers

Answer:

1)PERFORMANCE

2)RANGE

Explanation:

A mesh network can be regarded as local network topology whereby infrastructure nodes connect dynamically and directly, with other different nodes ,cooperate with one another so that data can be efficiently route from/to clients. It could be a Wireless mesh network or wired one.

Wireless mesh network, utilize

only one node which is physically wired to a network connection such as DSL internet modem. Then the one wired node will now be responsible for sharing of its internet connection in wireless firm with all other nodes arround the vicinity. Then the nodes will now share the connection in wireless firm to nodes which are closest to them, and with this wireless connection wide range of area can be convered which is one advantage of wireless mesh network, other one is performance, wireless has greater performance than wired one.

Some of the benefits derived from configuring a wireless mesh network is

1)PERFORMANCE

2)RANGE

Based on the information given, the correct options are performance and range.

It should be noted that a mesh network can be regarded as the local network topology whereby infrastructure nodes connect directly, with other different nodes ,cooperate with one another so that data can be efficiently route from/to clients.

The advantage of configuring a wireless mesh network is that it enhances performance and range.

Learn more about network on:

https://brainly.com/question/1167985

IT specialists must display technical expertise and collaborative proficiency in the workplace. Select the IT specialist who demonstrates a soft skill.

a. Terri uses her Java programming skills to write a key part of the company’s new software.
b. Joyce recruits users to test new software by explaining to them how it will benefit the organization.
c. Chandler evaluates the results of recent user tests of his company's new software.
d. Keith applies a filter to the company’s network that prevents users from accessing social media while they are working.

Answers

Answer:

b. Joyce recruits users to test new software by explaining to them how it will benefit the organization.

Explanation:

Skills can be classified as hard or soft. Hard skills include skills such as technical skills that are acquired through technical knowledge and training.

Soft skills on the other hand are skills exhibited as a result of personality traits, character and behaviours such as time management, leadership, communication and organizational skills.

Some hard skills include;

i. Ability to design banners and posters

ii. Proficiency in using programming languages such as Java to build software applications

iii. Evaluating the result of a test or research.

Some soft skills include;

i. Making public speeches that captivate the audience.

ii. Ability to recruit and test capabilities in others.

iii. Leading a team

So, Joyce recruiting users to test new software by explaining to them how it will benefit the organization is a form of soft skill since it consists, at minimum, of leadership and communication skills

The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.
A. mathematical.
B. timing.
C. chosen ciphertext.
D. brute-force.

Answers

Answer:

chosen ciphertext

Explanation:

Chosen ciphertext attack is a scenario in which the attacker has the ability to choose ciphertexts C i and to view their corresponding decryptions – plaintexts P i . It is essentially the same scenario as a chosen plaintext attack but applied to a decryption function, instead of the encryption function.

Cyber attack usually associated with obtaining decryption keys that do not run in fixed time is called the chosen ciphertext attack.

Theae kind of attack is usually performed through gathering of decryption codes or key which are associated to certain cipher texts

The attacker would then use the gathered patterns and information to obtain the decryption key to the selected or chosen ciphertext.

Hence, chosen ciphertext attempts the use of modular exponentiation.

Learn more : https://brainly.com/question/14826269

What would be the result of the flooding c++ cide assuming all necessary directive
Cout <<12345
Cout< cout < Cout<< number <

Answers

Answer:

See explanation

Explanation:

The code segment is not properly formatted; However, I will give a general explanation and a worked example.

In c++, setprecision are used to control the number of digits that appears after the decimal points of floating point values.

setprecision(0) means; no decimal point at all while setprecision(1) means 1 digit after the decimal point

While fixed is used to print floating point number in fixed notation.

Having said that:

Assume the code segment is as follows:

number = 12.345;

cout<<fixed;

cout<<setprecision(0);

cout<<number <<endl;

The output will be 12 because setprecision(0) implies no decimal at all; So the number will be rounded up immediately after the decimal point

Q. 2. What will be the output of the following code?
//printf("Hello\n");
printf("Girls");

Answers

Answer:

Just two outputs \n a line break so:

Hello

Girls

Write a recursive method that receives a string as a parameter and recursively capitalizes each character in the string (change a small cap to a large cap, e.g. a to A, b to B, etc) as following: capitalize the first letter from the string, then calls the function recursively for the remainder of the string and in the end, build the capitalized string. For example, for "java", will capitalize the first letter to "J"(base case), calls the method recursively for the reminder of the string "ava" (reduction), and after recursion/reduction is over it and returns "AVA" will build a new string from "J" and "AVA" and return "JAVA" to the calling method.
Write this algorithms in java source code plz.

Answers

Answer:

String words[]=str.split("\\s");  

String capitalizeWord="";  

for(String w:words){  

   String first=w.substring(0,1);  

   String afterfirst=w.substring(1);  

   capitalizeWord+=first.toUpperCase()+afterfirst+" ";  

}  

return capitalizeWord.trim();  

Explanation:

Define the word you are trying to capitalize and split it into an array.

String words[]=str.split("\\s");

Create a string for the capital output to be created as

String capitalizeWord="";  

Capitalize the word using the "first.toUpperCase()" and "afterfirst" functions

for(String w:words){  

   String first=w.substring(0,1);  

   String afterfirst=w.substring(1);  

   capitalizeWord+=first.toUpperCase()+afterfirst+" ";  

}  

Other Questions
In the third line of the poem Ol Higue, burning myself out like a cane-fire. What figure of speech is used? when utensils are washed and sanitized by hand, a _____ compartment sink must be provided A) Single B) Two C) Three write a couple of paragraph writing your plans and intention that you are going to when you will be meet your teachers and friends physically What describes Esquivel's primary purpose in her essay "At the Hearth"?to instruct the reader in how to prepare nutritious mealsto entertain the reader with quaint stories of her childhoodO to inform and persuade the reader about her dream of a "New Man"to persuade the reader to consider giving up meat What is the first step in solving quadratic equations by finding square roots? a. give the positive and negative answer c. square root both sides to isolate x b. isolate the x squared by using inverse operations d. none of these Please select the best answer from the choices provided A B C D Which one is this please help thank u Please solve with explanation What is the probability of rolling a number greater then two in a 6 sided number cube?A.) 1/3B.) 1/2C.) 2/3D.) 4/5 Por otro lado, estamos orando Y cuando creemos que est mejorando Nos agarra un apagn porfavor es una poesia satirica me pueden ayudar a ponerle otro verso que ritme The mean of four numbers is 7. Three of the numbers are 5, 7, and 7. What is the fourth number? Explain your reasoning. Need Help Quick !!!!!!!! What is the y-intercept of the line 5x 3y = - 18? River co. just paid a dividend of $2 per share out of earnings of $4 per share. If its book value per share is $25 and its stock is currently selling for $40 per share, calculate the required rate of return on the stock. Whats the answer to these Name the marked angle in 2 different ways. Which of these was MOST responsible forbringing about the decline of the Mali?O internal rivalriesO the defeat of SundiataO the invasion of GhanaO inflation caused by Mansa Musa digestive system label part A and C This fossil turtle and this living hawk both have a structure in their neck called the atlas bone. What best explains why both species have an atlas bone?a) The turtle and hawk are different species, so they must not share an ancestor population. They inherited their atlas bone structure from separate ancestor populations.b) The turtle and hawk both share the same ancestor population that had an atlas bone. They inherited this structure from the ancestor population.c) It is impossible to say. Fossils are very old; therefore, we cannot make observations of the turtles ancestors, and we cannot explain its body structures.d) All species have their own specific body structures, so it is a coincidence that this turtle and hawk each happen to have the atlas bone structure. One of the fastest Times of a recorded for the 50 yard dash is 5.2 seconds the following expression can be used to find how many miles per hour that is what is the missing factor Rewrite the following sentences using the structure have something done 13 was) Someone cleans my house everyday. There were no 14) Help