What is a symbol or container that holds a value?

Answers

Answer 1

Answer:

variable

Explanation:

you can program complex things with variables

Answer 2

Answer:

variable

Explanation:


Related Questions

Explain the working operation of Wi-Fi and hotspots in provision of broadband services

Answers

╭── ⋅ ⋅ ── ✩ ── ⋅ ⋅ ──╮

Hello, This is My explanation!

-----------------------------------------------------

A WiFi hotspot is a location that has been provided to give users the opportunity to use their devices away from their homes. These hotspots became popular over a decades ago at eating establishments such as cafes and are now found anywhere people wish to use them. (malls, airports,hotels,stores,restaurants,etc).

-----------------------------------------------------

Hope this Helped!

╰── ⋅ ⋅ ── ✩ ── ⋅ ⋅ ──╯

Please help its timed! Which of the following is an event? Select 4 options. adding three and four in a program. moving a mouse. clicking a mouse button. a sensor detecting the motion of an earthquake detector. scanning a credit card when you shop? ​

Answers

The option that is an event is known to be clicking a mouse button.

What is a computer event?

An event, in a computing context, is known to be any kind of action that aim to know or  is identified by a program and has a good importance for system hardware or software.

Events  examples  keystrokes and mouse clicks, program loading and others. so we can say that the option that is an event is known to be clicking a mouse button.

Learn more about  program from

https://brainly.com/question/1538272

#SPJ1

A message in your code that explains what is going on in your program (Known by seeing // before the message)

Answers

Answer:

comment

Explanation:

Comments just comment on the code.

Comments could be helpful when someone else has to read your code.

Comments just comment on the code. Comments could be helpful when someone else has to read your code.

What is Comments?

An explanation or annotation in a computer program's source code that can be viewed by programmers is known as a remark.

Compilers and interpreters typically ignore them because they were introduced to make the source code simpler for humans to understand. The syntax of comments differs significantly among programming languages.

Sometimes, comments are also handled in a variety of ways by documentation generators to provide documentation separate from the source code itself, or they are used to integrate with source code management systems and other types of external programming tools.

Therefore, Comments just comment on the code. Comments could be helpful when someone else has to read your code.

To learn more about comments, refer to the link:

https://brainly.com/question/30318947

#SPJ3

i will pay for this anyone please
PowerPoint
On the first slide, state your name and summarize the first scenario in terms of what you believe the problem to be and how the other person is feeling. Do not just restate what is written above, but interpret it based on your understanding of the situation.
On the second slide, describe in detail what your response will be to help the project manager in the first scenario.
On the third slide, list which employability skills you used to resolve the project manager’s problem. Explain why you believe these employability skills are important to achieving a successful resolution.
On the fourth slide, provide at least two reasons why you believe this particular situation would be difficult to resolve.
Use slides five through eight to repeat the first four steps, but for the second scenario.
On the ninth slide, state your partner’s name and present your partner’s feedback.
Word Document with the Following Sections
Your name
Summary of the Scenarios: Summarize the scenario as you interpret what you believe the problem to be and how the other person is feeling. Do not just restate what is written above, but interpret it based on your understanding of the situation.
Responses to Resolve the Situations: Describe in detail what your response will be to help the project manager.
Employability Skills Used to Resolve the Situations: List which employability skills you used to resolve the project manager’s problem. Explain why you believe these employability skills are important to achieving a successful resolution.
Why This Situation Is Difficult to Resolve: Provide at least two reasons why you believe this situation would be difficult to resolve.
Partner Comments: State your partner’s name. Include your partner’s feedback about your project.

Answers

This is something you would have to do yourself if this is a partner project and we don’t know you or your partners name using someone else’s would make it obvious that you didn’t do the work yourself. And the picture is blank there’s no further info on what you need done.

What are the operations in the machine cycle ?

Answers

The cycle consists of three standard steps: fetch, decode and execute.

HELP ME PASS!
Type the correct answer in the box. Spell all words correctly.
Nathan is creating a presentation for the employees at his office. Which media element should he use in the navigational buttons and menus in his presentation?
Nathan should use text or BLANK elements for the navigational buttons and menus in his presentation.

Answers

Nathan should use text or or  Action button elements for the navigational buttons and menus in his presentation.

What is an Action Button?

An action button is known to be an object that can be seen on a slide that helps one to be able to clicked or pointed to anything on a presentation.

Note that they are often used in self-running presentations and as such, Nathan should use text or or  Action button elements for the navigational buttons and menus in his presentation.

Learn more about presentation from

https://brainly.com/question/24653274

#SPJ1

what are some answers about computer languages​

Answers

Question: What is program execution?

Answer: Program execution is the process of carrying out instructions innate to the program by the computer. Before execution, the computer program is required to be loaded into the memory (RAM) of the computer.

Choose the appropriate software category for each specific application shown.

: Python


: Microsoft PowerPoint


: Windows 10 operating system

Answers

Python is the correct answer

2. What is the importance of ethics in emerging technologies?

Answers

Answer:

The importance of ethics in emerging technologies employ speculative data about future aspects such as items, applications, and consequences This help us make more informed moral judgments about and prescriptions for research

what do you feel are the consequences of fake news on American society and how have digital communication tools contributed to it

Answers

Digital communication is the inter-transfer of information from one point to another. It has increased the circulation of fake news and has greatly influenced society.

What is fake news?

Fake news or yellow journalism is the spread of false and incorrect baseless information from a source. The use of social networking platforms and television have increased the spread of fake news.

It has led to negative journalism and many sensational events that have affected society in a negative manner. It has been increased to gain monetary benefits and to make some conflicts.

Therefore, fake news has negatively affected the peace of society.

Learn more about fake news here:

https://brainly.com/question/11222703

#SPJ1

Suppose you want to pick the most reliable data storage option possible. What would you choose?
cloud storage
solid-state drive
optical disc
USB flash drive

Answers

Answer:

USB flash drive

Explanation:

A USB flash drive can store important files and data backups, carry favorite settings or applications, run diagnostics to troubleshoot computer problems or launch an OS from a bootable USB. The drives support Microsoft Windows, Linux, MacOS, different flavors of Linux and many BIOS boot ROMs.

Identify the following as a Program, Sub-Project, or Portfolio: (2)
a) Obtaining a Masters degree. Sub Project or Program
b) Pakistan’s Nuclear Weapons Program. Program
c) Developing the database of a remote payment system. Sub Project
d) Construction of cars in an automobile company. Portfolio

Answers

Answer:

obtaining a master degree.sub project or program

Which output returns the Boolean value FALSE? A. 3 B. 2 C. 1 D. 0

Answers

Answer:

D) 0

Explanation:

True - 1

False - 0

An example of a processing device would be

Answers

Answer:

Central processing unit (CPU) Graphics processing unit (GPU) Motherboard. Network card.

Explanation:

as my study I know this answer I hope it will be help full

Network card, Graphics processing unit, Motherboard, Central Processing unit, Digital Signal Processor, the list goes on.

What is one way that Accenture can ensure that the Cloud is secure for a client?

Answers

One of the ways through which Accenture can ensure that the Cloud is secure for a client is by utilizing special software to analyze all data transaction.

What is a cloud?

In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources (physical hardware) through virtualization and over the Internet, so as to enable the storage of files and documents virtually.

In this context, a way through which Accenture can ensure that the Cloud is secure for a client is by utilizing special software to analyze all data transaction.

Read more on cloud computing here: https://brainly.com/question/19057393

#SPJ1

what are the four main components of programming languages and why is each one needed?

Answers

Answer:

input, output, arithmetic and conditional and looping

This program will output a right triangle based on user specified height triangle_height and symbol triangle_char.
(1) The given program outputs a fixed-height triangle using a * character. Modify the given program to output a right triangle that instead
uses the user-specified triangle_char character. (1 pt)(2) Modify the program to use a loop to output a right triangle of height triangle_ height. The first line will have one user-specified character.
such as % or *. Each subsequent line will have one additional user-specified character until the number in the triangle's base reaches
triangle_height. Output a space after each user-specified character, including a line's last user-specified character. (2 pts)

Answers

The program illustrates the use of loops;

Loops are program statements that are used to perform repetitions

The program in Python

The python program where comments are used to explain each line of the program is as follows:

#This gets input for the triangle height

triangle_height = int(input())

#This gets input for the triangle character

triangle_char = input()

#This iterates through the triangle height

for i in range(triangle_height+1):

   #This iterates through each row

   for i in range(0,i):

       #This prints each character

       print(triangle_char,end='')

   #This prints a new line

   print()

Read more about python programs at:

https://brainly.com/question/26497128

#SPJ1

The name for the instructions you write to a computer in a program

Answers

Answer:

Code

Explanation:

The code is instructions that you can write yourself or download from online

Answer:

Code

Explanation:

Code

The name for the instructions you write to a computer in a program

A license agreement specifies the number of
devices on which you can install the product, any
dates of expiration, and other restrictions. True or false?

Answers

The statement that a license agreement specifies the number of devices on which you can install the product, any dates of expiration, and other restrictions is true.

What is a license agreement?

A license agreement is a formal agreement that is given to a person to do or use something.

It is a legal contract between people or government and a person to authorize over any product.

Thus, the given statement is true.

Learn more about license agreement

https://brainly.com/question/14681311

#SPJ1

ANSWER QUICKLY!!

Betty loves surfing online. She clicks on links that lead her to more information on a particular topic. Every time she clicks a new link she sees a
new page of another website. What is this called in terms of usage statistics?

Answers

Answer: I did some research I narrowed it down to page link and page break so I think it might be page link but look up page break and you will see what I think it might be that ok hope this helps.

Answer:

Page load

Explanation:

In terms of usage statistics, when Betty clicks on a link and is directed to a new page of another website, it is referred to as a "page load." A page load represents the action of a user accessing a web page and the browser fetching and rendering the content of that page.

a computer virus cannot be distributed by​

Answers

Answer:

Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document.

Explanation:

What is the name of the first screen displayed in a database application that introduces the application

Answers

Answer:

This first database was known as the Integrated Data Store, or IDS.

Explanation:

This first database was known as the Integrated Data Store, or IDS. This was shortly followed by the Information Management System, a database created by IBM.

How many terabytes is a 128 gigabyte SD memory card

Answers

Answer:

this would be .128 terabytes

Explanation:

This would be since for a whole terabyte you need 1000 gigabytes every 1000 gigabytes is a terabyte for example let’s say you have 5250 gigabytes you would have 5.250 terabytes that simple hope this helped!

Answer:

converting from gigabyte to terabyte, divide by 1000

therefore, 128 gigabyte = 128/1000 =0.128 terabyte

How to type the plus sign +

Answers

Answer:

you just did it. its on da keyboard

Explanation:

hold shift and click the equal sign

Shift + = = +

Answer:

For Windows and Mac OS

The easiest way would be to open your Character Map.  

Explanation:

Windows: How do I view a Character Map?

To start Character Map and see all the available characters for a particular font, click Start, point to Programs, point to Accessories, point to System Tools, and then click Character Map.

Mac OS: The easiest is to display the Mac OS Characters palette – just press [Command] + [Option] + [T], or [⌘] + [⌥] + [T]. You can then browse through various symbols and special characters, and simply double-click anyone to insert it into your current document.

CIS261: Python Programming I home
>
6.8: LAB: Miles to track laps

Answers

Python Programming Language is known to help or act as a support language that is used by software developers, to build and other purposes.

What is Computer Programming?

This is known to be the way or method that is used in writing of a composition of instructions that helps to inform the computer on what to do.

Note that in CIS261: Object Oriented Computer Programming, the  computer program is made up of some set of given instructions that are said to be executing only once in a time.

Conclusively, Its Basic instruction types is known to made up of input, process, and output.

Learn more about Python Programming from

https://brainly.com/question/26497128

#SPJ1

Choose the correct term to complete the sentence.

For most operating systems, the _______ function returns the number of seconds after January 1, 1970, 0:00 UTC.


O localtime()

O time()

O epoch()

Answers

Answer:

time() or time.time()

Explanation:

The time() method from the time module gives the amount of seconds after epoch, or Jan 1, 1970. Running this in the Python shell would return a number like this:

>>> time.time()

1652747529.0429285

For most operating systems, the time() function returns the number of seconds after January 1, 1970, 0:00 UTC. Thus, the correct option is B,

What is the time() function?

In python, the time() function is the function which returns the number of seconds that have been passed since an epoch. It is the point where time actually begins. For the Unix system, the time such as January 1, 1970, 00:00:00 at UTC is an epoch.

The time() method from the time module is used widely to give the amount of seconds which have been passed after the time period of an  epoch, or Jan 1, 1970. Running this in the Python shell would return a number like the one listed in the question.

Therefore, the correct option is B.

Learn more about time() function here:

https://brainly.com/question/12174888

#SPJ2

Question 9
The district purchases a web resource for the elementary campuses, but you
want to use it with your 9th grade students who need remediation. This would be
allowed because the district has extra licenses.
O True
False?

Answers

i think this is false im not sure tho

Explain the stages of the evolution of the idea of IDS and its importance of security, military and examine the importance of intrusion detection systems and categories classifications, and where can put IDS to reduce the risk to the network.

Answers

Intrusion detection systems (IDS) is a software type that is used to check for violations of policy or any other malicious activity. IDS detects and prevents unauthorized activities.

What is IDS?

Intrusion detection systems (IDS) is the technological system that is built to check for any suspicious and unauthorized activities. They detect the network system and the system logs.

The unauthorized and suspicious things are scanned and made an alert. It is very crucial in many fields as many documented and private items are needed to be protected.

Therefore, IDS can be of various types like host, network, perimeter, and VM.

Learn more about IDS here:

https://brainly.com/question/20709626

#SPJ1

AUPs ensure that an organization’s network and internet are not abused. Select 3 options that describe AUPs.

connecting to unauthorized devices through the network

going onto unauthorized sites or downloading certain content

not sending spam or junk emails to anyone

not using the service to violate any law

reporting any attempt to break into one’s account

Answers

AUPs often involves not going onto unauthorized sites or downloading certain content, not using the service to violate any law, and not connecting to unauthorized devices through the network.

What is AUP?

AUP stands for Acceptable Use Policy, which refers to a policy that regulates users when they access a corporate newtork.

How does an AUP regulates users?

Most AUPs imply:

Users can only access certain sites and dowloading specific content is forbidden.The access to the internet or network cannot be used for criminal purposes.Only authorized users can connect to the corporate network.

Learn more about AUP in: https://brainly.com/question/9509517

#SPJ1

Answer:

not sending spam or junk emails to anyone

not using the service to violate any law

reporting any attempt to break into one’s account

Explanation:

The Texas Department of Education has offices throughout the state covering more than 268,000 square miles. State documents are stored on a large server in a central location, so that employees can access the data they need regardless of their physical location. The type of network used by the organization is most likely a _____.


LAN


WAN


MAN

Answers

Answer: WAN

Explanation:

Other Questions
What clues have readers gotten by Chapter 5 of the Garner household's finances? Cooper asked his classmates, "How many days do you floss your teeth in atypical week?" The table shows Cooper's data.Days of Flossing per Week454 233103367260532704443 3012235 3713How many observations did he record?OA. 40OB. 35OC. 30D. 7 please help, no linksthe last answer choices for #4 is D) conocisteis Identify the following literary devices. Terms can be repeated/used many times. ___________________________I am a leper.___________________________The warm and comforting fire helped her keep calm.___________________________Writers weave their witty, wonderful words into webs.___________________________Saying goodbye to my friend was bitter sweet.___________________________Snow has wrapped a white blanket over the city.___________________________It was so funny, I nearly died laughing.___________________________Her eyes were fireflies.___________________________Canada expects its citizens to pay taxes.___________________________It was a minor catastrophe.___________________________Splish-splash downhill our sleigh went in the snow.___________________________His word is as good as gold.___________________________Passing breeze made a whooshing noise.Match the following terms with definitions K /13Protagonist, narrator, plot, climax, theme, setting, antagonist, point of view, conflict, characters, foreshadowing, flashback, symbolTime and place in which a story happens. The problems or struggle in the story.A real life object representing an abstract ideaMain and minor people/animals in the storyA memory, a thought or going back in time by characterThe person who tells the storyThe perspective from which the story is told. The main message or main idea of the story. The order of events in the storyClues or hints about what is going to happen in the futureMain character in the story; good or badMain character who fights with the protagonistThe highest point of tension in the story In American football, a touchdown scores 7 points, a field goal scores 3 points, and a safety scores 2 points. If a team scored a total of 24 points, how many combinations of plays is possible help asap please!! Employees of the sports department at a television station want to measure the number of viewers for a particular exercise program. They call the homes of all the members of a nearby health club. Why might this be a biased sample?A.The station does not include everyone in the viewing area. B.The station does not include people all across the country.C.People who belong to a health club may have many television sets in their homes.D.People who belong to a health club may be more likely to watch an exercise program. Which of the three following graphs display the same data? i. a bar graph titled county voter turnout (thousands) has year on the x-axis and number on the y-axis. 1992, 99; 1996, 107; 2000, 103; 2004, 97; 2008, 98. ii. a line graph titled county voter turnout (thousands) has year on the x-axis and number on the y-axis. 1992, 99; 1996, 107; 2000, 103; 2004, 97; 2008, 98. iii. a circle graph titled county voter turnout (thousands). cuyahoga county, 99; maricopa county, 107; fort bend county, 103; susquehanna county, 97; clark county, 98. a. i and ii b. i and iii c. ii and iii d. i, ii, and iii A leaking septic tank is polluting groundwater. What kind of pollution is this?A: watershed pollutionB: nonpoint-source pollutionC: point-source pollutionD:aquifer pollution In which sentence does javed restate the topic? sentence 1 sentence 2 sentence 3 sentence 4 Which factor most likely made large scale human migration from asia to north america possible during the prehistoric age Is a megabyte bigger than a gigabyte. 4. In the second paragraph on page 9, theauthor writes:"I was driving through afeedlot, with tens of thousands of animalsbellying up to a concrete trough that ranalong the side of the highway for whatseemed like miles." Using context clues,what do these words mean? What dothese words help the reader understandabout where hamburgers come from? I want to know about the history of The Sino -Japanese War Direct object pronouns: Choose the correct response to the dialogue.1. Quieres estudiar la gramtica?-No, no _____ quiero estudiar. a. la b. lo c. l d. las hi, Can you help me please? 1. How can you describe the likelihood of an event? Annotate: In paragraph 1, highlight the topic the author introduces with an anecdote.Analyze: Consider the title of this selection. Why might the author have chosen to begin her argument with this example? (3x-5y)+(x+2y)? Someone help me. Will give brainliest Whats the answer?????