Answers

Answer 1

Explanation:

String constants, also known as string literals, are a special type of constants which store fixed sequences of characters. A string literal is a sequence of any number of characters surrounded by double quotes: ... The null string, or empty string, is written like "" .


Related Questions

In a ______, the bars that represent the categories of a variable are spaced so that one bar is not directly next to another; whereas in a ______, the bars actually touch one another.

Answers

Answer:

The correct answer would be "bar graph; histogram".

Explanation:

The bar graph has become a photographic arrangement of information which always practices that relate bars to consider various give information. Alternatively, this is indeed a diagrammatic comparative analysis of univariate data. This same histogram demonstrates the variation including its frequency of repeated measures, introduces numerical information.

Why RAM is called volatile memory?​

Answers

Explanation:

RAM is called 'volatile' memory by analogy because if the computer loses power, all the data stored in RAM

Explanation:

Random Access Memory ( RAM ) is called volatile memory because it's data contents remain permanent and do not lose data if the electricity is not supplied.

Hope I helped ! ツ

Have a wonderful day / night ! ♡

▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁

Which of these statements regarding mobile games is true? A. They are typically played indoors. B. They have detailed environments. C. Their levels can be completed quickly. D. They are typically played for several hours at a time. E. They are played on large screens.



game development

Answers

Answer:

c

Explanation:

The statements regarding mobile games that is true is that their levels can be completed quickly.

What is mobile games?

Mobile games are known to be games that have been set up for mobile devices, such as smartphones.

Note that Mobile games can be seen from basic to hard levels and as such, The statements regarding mobile games that is true is that their levels can be completed quickly.

Learn more about mobile games from

https://brainly.com/question/917245

#SPJ2

In the list [0, 13, 5.4, "integer"], which element is at index 2?
A.0
B.13
C.5.4
D.“integer”

Answers

Answer: C) 5.4

The index starts at 0

index 0 = 0index 1 = 13index 2 = 5.4index 3 = "integer"

If there are n elements in a list, then the index ranges from 0 to n-1.

To navigate through your presentation slides, which key on your keyboard can you use?
Dankonace

Answers

Answer:

You use your arrow keys

Explanation:

Answer:

Space bar

Explanation:

(04.06 LC)

To navigate through your presentation slides, which key on your keyboard can you use?

Group of answer choices

Backspace

Tab key

Space bar

Enter key

Austin works as a department head and frequently uses presentations to deliver information to his staff. He relies heavily on presentation technology because of its many benefits, which include _____.



ensured accuracy


visual appeal


work can't be lost


fast creation


ease of updating

pls help

Answers

Answer: ensured accuracy

Explanation:

Answer:visual appeal, ease of updating, fast creation

Explanation:

black and white squares codehs, i need the whole code (40 points for correct answer)

Answers

Answer:

speed(0)

penup()

setposition(-100,0)

count=0

def make_squares(i):

if i % 2 == 0:

begin_fill()

for i in range(4):

forward(25);

left(90)

end_fill()

penup()

pendown()

for i in range(6):

pendown()

make_squares(i)

penup()

forward(35)

Explanation:

To improve accuracy during user input, a designer can add context to the ________ from the properties screen which will be displayed in the status bar to provide additional information to users who are entering data.

Answers

Answer:

Description

Explanation:

To improve accuracy during user input, a designer can add context to the Description from the properties screen which will be displayed in the status bar to provide additional information to users who are entering data.

Hey, anyone like will u jus help meh like pleaseee
Which type of Malware is hard to detect and collects personal data?
1.Spyware
2.Virus
3.Worm
4.Trojan Horse​

Answers

Answer:

1

Explanation:

Answer:

1. Spyware.

Explanation:

Sure... pls give another person brainliest...

love u ❤️

hope it helps

Which activity might be a job or task of an IT worker who manages work

Answers

Answer: Sets up a LAN for the office

Explanation:

The activity that might be a job or task of an IT worker who manages work is the setting up of a local area network for the office.

Through the setting up of the local area network, the computers in the company can be interconnected together within the organization.

I’m tutoring a kindergartener virtually and have run out of things to do that will keep her engaged. Does anybody have any ideas?

Answers

Maybe cut out some numbers in different colors, he/she might be more engaged!

Answer: Try to just make it fun. Include things they like, love, and or think are funny.

pls help have absolutely no clue how to delete this

Answers

Answer:

is that a picture or a file if it's a file then touch the pad with two fingers

if a picture then i don't know  

Explanation:

Answer:

not sure if this will mess anything up but try to run cmd as admin and del that folder

Explanation:

Which column and row references are updated when you copy the formula f$3/15

Answers

Answer: Column F

Explanation: In Microsoft excel, for the sake of robustness and to aid the effectiveness of updating formulas across cells. The reference of cells are treated as relative which means that when formulas are copied across columns or within rows, they get updated automatically. However, some numbers may be treated as constants such that we do not want them to change or be updated as we move acisss cells. Thus, such numbers are treated Given absolute references, which is made possible by adding a '$' prefix before the colum alphabet or row number or both. in the scenario given above, the row has the $ prefix, hence, it is absolute and will not change but the column alphabet does not and hence, treated as relative.

Which type of programmer writes code for operating systems?
A.
application programmer
B.
web programmer
C.
game tools programmer
D.
system programmer <------ Correct
E.
artificial intelligence programmer

Answers

Answer:

d.is the correct answer

Answer:

Answer is D.

Explanation:

aux Which of the following is the best name for a history report about World War I? (6 points)​

Answers

Answer:

The best name of a history report for world war I:  The Great War

Explanation:

Based on what I learned in my past history classes, World War I was also known as The Great War. It was the most deadliest war in American history

Answer:

6 points

Explanation:

what is the range of values used whe setting velocity?

A. 0% to 100%

B. -100% to 100%

C. 0% to 200%

D. -100% to 200%

Answers

Answer:

A. 0% to 100%

Explanation:

Velocity can be defined as the rate of change in displacement (distance) with time. Velocity is a vector quantity and as such it has both magnitude and direction.

Mathematically, velocity is given by the equation;

[tex] Velocity = \frac{distance}{time} [/tex]

The range of values used when setting velocity is 0% to 100%.

Hence, when working on a virtual reality (VR) robot, you should use a range of 0% to 100% to the set the value of velocity. This range of values are used to denote the rate at which the robot moves i.e its forward and backward motion (movement).

help with this please anyone
Keywords:
-Virus
-Spyware
-Worm
-Trojan Horse
Definitions:
-This type of malware pretends it will be useful and it is a safe program when it will actually try and attack your device.
-This type of malware can copy itself hundreds of times so can hard your device very quickly.
-A type of malware that spreads through normal program.It could simply slow down your device down or cause you to lose all access to programs on your computer.
-A type of malware that installs itself onto devices and steals personal information about the user like usernames and passwords.It tracks every key the user pressed called key logging.
PLZ ANYONE HELP ME ​

Answers

Answer:

       trojan horse

         worm

         virus

        spyware

Explanation:

gimme the brainliest hehe

Answer:

1).Virus :- A type of malware that spreads through normal program.It could simply slow down your device down or cause you to lose all access to programs on your computer.

2).Spyware:- A type of malware that installs itself onto devices and steals personal information about the user like usernames and passwords.It tracks every key the user pressed called key logging.

3).Worm:- This type of malware can copy itself hundreds of times so can hard your device very quickly.

4). Trojan Horse :- This type of malware pretends it will be useful and it is a safe program when it will actually try and attack your device.

Explanation:

Pls give another person brainliest...

thanks hope it helps

What are the steps to insert an image into an email message place the steps in the correct order

Answers

Answer:

1. Start a new message

2. click the insert tab.

3. look for the illustrations command group

4. click pictures

5. browse, select, and insert your choice

Explanation:

A port that allows the transfer of high quality video and audio signals is called a(n) ________ port.

Answers

Answer:

HDMI

Can't you look this up?

To step through a program, what status indicator light needs to be on?

Answers

Answer: It should always stay on normal

Explanation:

Hope this helped :)

Digital signals transmit zeros and ones through changes in

frequency

light intensity

voltage

Answers

Voltage hope this helps

Answer

voltage

Explanation:

the other person is correct i got a 100 % thanks to them

Cars are an example of what type of technology?

Answers

Answer:

A number of cars already have semi-autonomous capabilities in the form of driver-assisted technologies. These include automatic-braking sensors, motorway lane sensors, mapping technology that monitors blind spots, cameras in the back and front of a car, adaptive cruise control and self-parking capabilities.

Explanation:

Answer: Mechanics

Explanation: cause is moves and Mechanics stuff moves around not the mechanics pencils.

Which operating system (OS) is used to run your laptop?

Answers

Answer:

Windows or Linux

Explanation:

It would most likely be windows but theres not enough information to make a sure decition.

Answer:

The most known one are, macOS, Windows, and Linux.

Bonus: The most known smartphone operating systems are Android and iOS

Explanation:

Most presentations use text: A. To draw attention to content
B. At a minimum
C. Without restraint
D. To maximize area and style

Answers

i think it’s c hope this helps

can someone help me solve this pls

Answers

Answer:

1. Textbox

2. Button

3. Boolean

A walk-through of the project deliverable is conducted by
__

Answers

A walk through of the project deliverable is conducted by: the sellers agent

It was brought to Dennis's attention that some of his employees' e-mail practices were unethical. Read the scenarios described below and identify the unethical practices.


Darlene sends a memo to all employees outlining the new procedure for tracking inventory in the database.

Luke sends out an e-mail to co-workers asking them to sponsor him in a walkathon next month.

Nancy sends the latest computer jokes out to all the company's employees to brighten their day.

Bob forwards a customer inquiry to the sales representative assigned to the account.

Answers

Answer:

Answer: B (Luke sends out an e-mail to co-workers asking them to sponsor him in a walkathon next month.)

Explanation:

The answer would be B, if you can add multiple then C could also fall under the unethical catoagory.

TRUE OR FALSE - SQL language is used to query data in a Relational Database?

Answers

Answer:

Yes I agree with the other person who answered that

Which of the following is a visual thinking tool that aids students in organizing ideas through analysis, synthesis, and comprehension?


mind map

outliner

outline

drawing

Answers

Answer:

mind map hope this help

Explanation:

The answer is:

mind map

Mike needs to write the primary objectives of a project in a project plan. In which section should he write them?
A.
scope
B.
overview
C.
baselines
D.
schedule

The answer is B.) overview

Answers

D because you are always supposed to use your schedule

Answer:B

Explanation: yes

Other Questions
A relative asks your advice about a skin cream that reduces oxidation ofthe lower skin layers and, thereby, reduces skin aging. Explain to her theeffectiveness of the skin cream based on that claim.? Total surface area of tringular prism 10 cm6 cm4 cm8 cm What are the early sometimes of HIV, and how do they contribute to the spread of the virus?People who are infected with HIV may not show symptoms for 10 years or more, so they can unknowingly spread the virus if they do not have a blood test to check for the infectionPeople who are infected with HIV many not show symptoms for many years, and the infection only spreads once sores, coughing, and other sometimes appear. The HIV virus has many early symptoms that are easily mistaken for a bacterial genital infection; the symptoms go away on their own so the infected person often thinks the bacteria infection is curedThe HIV virus has mild symptoms like cough, fever, and body aches during the first 10 years; people often think to have the flu and do not take a blood test to check for an HIV infection Given the equations y = 4x + 5 and y = 4x - 7, what is the relationshipof the two lines?OA. PerpendicularB. ParallelC. SkewD. Neither The average person eat 60 hot dogs per year. Rita is 86 years old. About how many hot dogs would she have eaten during her lifetime there are 5000 books in the towns library. Of these, 4900 are fiction. To find the percent of the books that are fiction, first set up the equation. Then find the percent Solve the linear equation 29 - 3x = 5x + 5 if a -2 ion has 34 protons, what element is it? (PLEASE HELP! WILL GIVE BRAINLIEST)The length of each of the two congruent sides of an isosceles triangle is 2x + 3. The length of the third side is 2x. Its perimeter is 36 centimeters. Choose an equation that could be used to find the value of x. Choose the correct answer for x and choose the correct length of all three sides. Choose 3 answers. what does a school district do ? At the market, 888 apples cost \$4$4dollar sign, 4.How much do 999 apples cost?\$ 2What is the weight of an object of mass 8.5 kg? HELP PLS ASAP I WILL GIVE BRAINLIEST How did CNN change news? Who were the Protestant reformers that believed in equality for all people?I will give brainliest! What number is represented on the number line? Give your answer as a decimal and as a mixed number (4m - 4m)+(-3m -2m2 + 4 m?) you have just administered 3 tablets with a dose strength of 1.5mg tablets. What is the total dosage? parallel lines in real world, help please A force, 10 N drags a mass 10 kg on a horizontal table with an acceleration of 0.2m/s2. If the acceleration due to gravity is 10 m/s2, the coefficient of friction betweenthe moving mass and the table is?