I'm going to assume this is Java, because you said "method" meaning it will be some sort of object oriented language, and Java's really common. Here would be the full program, but you can just take the method out isolated if you need it.
package lastname;
public class LastName {
public static void main(String[] args) {
// Example usage:
String name = LastName.lastName("Garrett Acord");
System.out.println(name);
// Output: Acord G.
}
public static String lastName(String fullName)
{
String[] splitName = fullName.split(" ");
return String.format("%s %s.", splitName[1], splitName[0].substring(0,1) );
}
}
Answer:
Option (3) is the correct answer of this question.
Explanation:
- HCatalog makes available Hive metadata to users of other Hadoop applications, such as Pig, MapReduce and Hive. it offers interfaces for MapReduce and Pig so that users can read data from and write data to the Hive warehouse.
- This means users don't have to care about where or in what format their data is stored. So we know this way that Hcatalog makes sure our data is secure.
- Others option does not belong to Hcatalog so these options are incorrect .
Answer:
operating systems
Explanation:
The operating systems is shortly known as OS. It is a system software which manages the software resources of the computer, computer hardware and also provides some common services for the various computer programs.
Most of the operating systems available in the market provides some common utility programs such as the search program, a backup program and a storage management program also.
Some common operating systems are : Linux, Microsoft Windows, Ubuntu, macOS, Unix, and many more.
Theft or vandalism through to natural disasters are physical threats. Non-physical threats target the software and data on the computer systems, Like hackers or just straight up viruses. Also, untrustworthy apps or games can give your computer viruses as well.
Answer:
B. blocking I/O
Explanation:
Most of the input and output request placed to the computer considers the blocking request. It means that the controls given cannot be returned to the given application until and unless the input/output is complete.
Thus, blocking the input/output does not return till the input and output is complete.
With a blocking I/O, the process is moved to a wait queue when the I/O request is made, and it moved backs to the ready queue as soon as the request is complete, thereby allowing the other processes to run in the meantime.
Thus (B) blocking I/O is the answer.