Answer:
variables are any characteristics that can take on different values, such as height, age, species I think
Answer
A variable basically works as a "placeholder" for anything that might change a majority of the time.
Examples
In science one may call a factor in a experiment that is subject to change a variable.
In math the term is used for a symbol that we do not know yet, such as x or y. Typically in math a variable is a letter.
In computer programming, variables are used to store information to be referenced and used by a computer program. They do give a way of naming data with a descriptive name as well so programs can be understood more clearly. When you go to assign values to the "variable" you are basically assigning individual variables such as the ones above in a way.
How to turn robot voice like real human voice.
________________ is access to the internet through your tv connection.
Answer:
Cable Modem
Explanation:
what is a common indicator of a phishing attempt cyber awareness 2022
There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.
Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.
Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.
Learn more from
https://brainly.com/question/24069038
it is possible to be logged into a wi-fi network that does not have internet access.
Answer:
yes it is possible. it'll take some work tho
Explanation:
you would have to bypass the security and disable the proxy and go through the firewall and do some other things to access it
Which is a function of an operating system?.
Answer:
An operating system is known as the interface between the computer hardware and the user itself. It is one of the most essential parts of a computer, and is the most integral software. It's responsible for executing programs, handling other inputs i.e an additional mouse, keyboard, etc. as well as handling storage for data and other files. In addition to this, it manages the computer's resources as well as executes and enables services.
Tamara is writing a program to organize students in a class and needs to use operators to organize student grades, then compare the results of that to each other. What kinds of operators does Tamara need to use for each step?
Tamara needs to use
operators to organize the students' grades, then
operators to compare the results.
Answer: you said "Tamara needs to use
operators to organize the students' grades, then
operators to compare the results."
i think your right
Explanation:
sounds right.
unlike tv or newspaper ads, internet communications are interactive, and consumers can choose which messages and information they receive. for this reason, company web offerings can be tailor-made for the ________.
Companies often engage the services of Advertising firms to market their products. Company web offerings can be tailor-made for the consumers.
Advertising agencies are firms that makes, plan and handle the advertising needs of any business. They are known for handling negotiations creating tailored marketing campaigns.A lot of agencies do not want to talk about pricing until they know what you can afford to spend.
Tailored content are delivered experiences that speak directly to customers.
This agencies uses their connections and resources to make one's campaign successful and cost-efficient.
Learn more from
https://brainly.com/question/23477855
Until 2016, the popular song _____ was covered by copyright law, unusually long after it was written in 1893.
A.
Happy Birthday
B.
Merry Christmas, Everyone
C.
Hava Nagila
D.
Auld Lang Syne
Answer: Happy Birthday
Explanation:
1.Write a C++ program that allows the user to enter the phrase "I am smart". Output the first letter and last letter of the phrase using string properties.
2.Write a C++ program to output the following values after they are loaded into an array: 67, 45, 12, 89, 46, 88 and 43.
PLS Help they are different questions
Answer:
1)
string value;
cout << "type I am smart";
cin >> value; // get user input from the keyboard
2)
int num1 = 67;
int num2 = 45;
int num3 = 12;
int num4 = 89;
int num5 = 46;
int num6 = 89;
int num7 = 46;
int num8 = 88;
int num9 = 43;
int numbers [ ] = {num1,num2,num3,num4,num5,num7,num8,num9} ;
//to load it as a function
int main ()
{
for ( n=0 ; n<5 ; n++ )
{
result += numbers[n];
}
cout << result;
return 0;
}
The C++ programs are illustrations of arrays and strings
The program 1The program written in C++ is as follows:
#include<iostream>
using namespace std;
int main(){
//This declares the string
string myStr;
//This gets the input
cin>>myStr;
//This prints the first and the last index elements
cout<<myStr[0]<<" "<<myStr[myStr.length()-1];
return 0;
}
The program 2The program written in C++ is as follows:
#include<iostream>
using namespace std;
int main(){
//This initializes the array
int myArr [] = {67, 45, 12, 89, 46, 88, 43};
//This prints the array elements
for(int i = 0; i<7;i++){
cout<<myArr[i]<<" ";
}
return 0;
}
Read more about arrays and strings at:
https://brainly.com/question/15683939
#SPJ2
ok so I have two accounts and like, the other account has -20 points??? what happened
Four types of firewalls are: Packet filtering, stateful inspection, circuit level proxy and _________ .
Answer:
oxigen
Explanation:
What is the largest integer that can be represented with 4 bits?.
Answer:
15
Explanation:
You can calculate the maximum number using a simple formula:
2^N (Where N is the number of bits) - 1
So 2^4 - 1 = 16 - 1 = 15
In high-tech fields, industry standards rarely change.
True
False
Answer: false
Explanation:
1. Which software is used mostly for typing text? a) Word b) Excel O c) PowerPoint o d) Paint
Answer:
a. Word
Explanation:
Microsoft Word is the most widely used word processing software according to a user tracking system built into the software.
Answer: a) Word
Explanation: Microsoft Word is the most widely used word processing software.
In Java, a reference variable is ________ because it can reference objects of types different from its own, as long as those types are related to its type through inheritance.
Answer:
polymorphic
Explanation:
An example of polymorphic reference, suppose you have 3 classes: Main, Product and SpecificProduct. If SpecificProduct extends Product this means it is a product class but with something else to complement.
Say you want to reference an object of product in the main class, you can do it the classic way:
Product pd = new Product();
Or you can do it polymorphic, like this:
Product pd = new SpecificProduct();
The program will accept just fine because SpecificProduct is extending Product. When you do it like this, we say the reference you made was a polymorphic reference
When resizing images or objects in a presentation, why should a user not utilize the sizing handles in the middle of the sides or bottom of an image?
B will resize but not maint aspect ratio was correct
Answer:
b. It will resize the image but not maintain aspect ratio
Explanation: is correct. post protected
Answer:
b
Explanation:
what programming language supports relational databases?
A programming language that supports relational databases is SQL (Structured Query Language)
Structured Query Language (SQL), is the principal method for communicating with Relational Databases.
A relational database is a group of data elements that are linked together by predefined connections. These elements are laid up in the form of a series of tables containing columns and rows.
Tables are utilized for storing data about the items that will be displayed in the database. A column in a database contains a specific type of data, whereas a field records the actual value of an attribute. The table's rows indicate a collection of linked values for a single item or entity.Each entry in a database can be assigned a unique identity known as a primary key, and rows from other tables can be linked together via foreign keys. This data may be accessible in a variety of ways without having to reorganize the database tables itself.
Learn more about Relational Databases here:
https://brainly.com/question/8457395?referrer=searchResults
a steep reduction is memory available on the heap to the poiont where it is completly exhausted is known as a
Based on the information that is given, a steep reduction in the memory that's available is known as a memory leak.
A memory leak simply means a form of resource leak which occurs when a computer program manages memory allocations incorrectly in such a way that the memory that isn't needed anymore aren't released.
It should be noted that a memory leak is also a steady reduction in memory available on the heap to the point where it's exhausted. It can also be when an object that is stored in memory can't be accessed by the running code.
Read related link on:
https://brainly.com/question/25820385
we are unable to process your request at this time. if you continue to receive this error, please contact cardholder services by calling the number on the back of your card.
Answer:
is this a sim chip card replacement card for Electronics ?
Explanation:
a ________ uses electronic memory and has no motors or moving parts.
Answer:
a to uses electronic memory and has no motors or moving parts.
Explanation:
brainliest me and follow ty
Which tools exist on the 3-D Map Layer pane? Check all that apply. filter options layer options time visualization category visualization Udata layer visualization data value visualization
Answer:
filter options
layer options
category visualization
data value visualization
Explanation:
When a mobile user connects to a main office using a standard Internet connection, a ____ provides the mobile user with a secure connection to the company network server.
A virtual private network (VPN) is an encrypted connection using a standard Internet connection to connect a device to a network.
A virtual private network (VPN) is used to connect a private network to a public network. It enables users have access to the private network thereby enabling them to send and receive data across public networks.
A virtual private network (VPN) is an encrypted connection using a standard Internet connection to connect a device to a network.
Find out more at: https://brainly.com/question/25234505
write an expression taht evaluated to true if and only if the variable s does not contain the string 'end'
Answer:
//check which string is greater
if(strcmp(name1,name2)>0)
//assign name1 to first, if the
//name1 is greater than name2
first=name1;
else
//assign name2 to first, if the
//name2 is greater than name1
first=name2;
5)
//compare name1 and name2
if(strcmp(name1,name2)>0)
//compare name1 and name3
if(strcmp(name1,name3)>0)
//assign name1 to max, becuase
//name1 is greater than name2 and name3
max=name1;
Explanation:
Consider the following code segment, which is intended to store the sum of all multiples of 10 between 10 and 100, inclusive (10 20 ... 100), in the variable total.
int x = 100;int total = 0;while( /* missing code */ ){total = total + x;x = x - 10;}Which of the following can be used as a replacement for /* missing code */ so that the code segment works as intended?A. x < 100.B. x <= 100.C. x > 10.D. x >= 10.E. x != 10.
The code segment illustrates the use of while loops
Loops are program statements that are used for repetitive and iterative operations
The missing statement in the code is x>= 0
The code is meant to add numbers from 10 to 100 (inclusive) with an increment of 10.
At the beginning of the program, variable x is initialized to 100, and it is reduced by 10 in the iteration until it gets to 10
So, the condition must be set to stop when the value of x is 10 i.e. x >= 0
i.e. the iteration must be repeated while x is greater than or equal to 10
Hence, the missing statement is (d) x >= 0
Read more about loops at:
brainly.com/question/16397886
The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triad.
PLEASE HELP ME FASTTTTTT Input statements allow the user to enter data that a program uses to perform necessary computations. Users enter the data when they the program.
Answer:
The scanf() is the function that is used to take inputs from the user with the help of the standard input device,i.e, the keyboard.
scanf() function is capable of taking any data type as an input, though it has to be specified first like %d for integers, %s for strings and %f for floating-point type. The gets() function can only take a string as an input.
Explanation:
Answer:
ur
Explanation:
ur mom
text to appear
Name the highlighted part as a whole. What are the segments- bgcolor and “SKYBLUE” called?
What is the output going to be due to the highlighted part?
Answer:
bg color stands for background color while SKYBLUE is the color assigned to it.
Explanation:
It is setting the background color of the body tag to sky blue.
In older languages, you could leave a selection or loop before it was complete by using a ____ statement
Answer:
D) go to
Explanation:
A) next
B) go next
C) loop
D) go to
D) go to is correct answer
(Hope this helps can I pls have brainlist (crown)☺️)
the pathway through which an electric signal moved between devices is known as what?
from which Menu option you can change page setup in MS Word
page layout tab or the page setup dialog box