1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ostrovityanka [42]
2 years ago
12

What is it called when you define a variable for the first time

Computers and Technology
2 answers:
Serga [27]2 years ago
7 0

Answer:

declaring a variable

Explanation:

you have to declare a variable before you call it

Nimfa-mama [501]2 years ago
6 0

Answer:

That is called declaring a variable

Explanation:

You might be interested in
In statistics, what is the mode of a data set?
drek231 [11]

Answer:

In statistics, the mode of a data set would be the numbers that occur the most in a data set.

Explanation:

7 0
3 years ago
Read 2 more answers
Which group of Indians was native to Roanoke and not very friendly?
uysha [10]

Answer:

Croatan I think if I remember it right.

Explanation:

5 0
3 years ago
Read 2 more answers
Find a password that "breaks" zxcvbn, i.e. it is probably easy to crack but zxcvbn reports that it has a cracking time of centur
levacccp [35]

Answer:

C0r3CtPP4zzu0Rd

Explanation:

zxcvbn is a password security and "strength" meter. This meter can identify password repetitions and patterns that will make it easier for some of your passwords to be discovered and your account to be hacked. This meter has as easy passwords to be discovered passwords that have dates, popular words or phrases, personal names and etc.

For zxcvbn to consider a password as strong, which would take centuries to be discovered, it is recommended that two words are used. In addition, these words must have a combination of uppercase and lowercase letters, numbers and symbols.

In this case, we can consider that the password "C0r3CtPP4zzu0Rd" is an easy password that could break zxcvbn.

If you pay attention, the password shown above is a code for the words "correct password", however, there is a combination of letters, numbers and symbols that follow a logical sequence and easy to be memorized, however zxcvbn would consider a * that it would take centuries to be discovered.

5 0
3 years ago
Suppose that you have been asked to create an information system for a manufacturing plant that produces nuts and bolts of many
maksim [4K]

Answer:

Following are the solution to this question:

Explanation:

In essence, both issues (relevant) were addressed, that form the design of the system, and all of the information collected and during initial analysis along with all subsequent stages will, in turn, affect the design of the system. Being aware, that perhaps the data is obtained to establish the entities, attributes, or relations. In particular, partnerships, clearly outline, or cardinal-ties are shaped by company policies derived from the creator's information. Example problems and the probable effects on the layout may be:

It will create the file concurrently for all depts, or would like to build and execute the database simultaneously with one dept?  

How would the work be to design affect the development process? In other terms, determine the range of the system as well  

as its limits about the bottom-up, centralized, or decentralized.

Do you want, and would you like an integrated framework to develop a single module? (Inventory, production, shipping, billing, etc.)  

Would you like a product code, output change, and form of controlling the bolts and bolts and dept? Impact: design of the logical and physical server.  

Perhaps you'd like to monitor the sources of every lot a raw resources for the nuts and bolts manufacturing? Impact: design of the logical and physical server. Model E-R.  

Perhaps you'd like to monitor consumers receiving shipments of bolts and nuts? Impact: design of the logical and physical database. ER model.  

Its documents will you demand, or to whom can these documents be transmitted? What specific reporting requirements?  

Reactions to such concerns relate to the design, execution, testing, or subsequent functioning of the logical and physical system.

8 0
3 years ago
Hello<br> How can I add background image in html website?
ZanzabumX [31]
In the CSS, background-image: url( "/path/to/file" )

http://www.w3schools.com is a handy reference.
6 0
3 years ago
Other questions:
  • Computers spend most of their time in loops, so multiple loop itera- tions are great places to speculatively find more work to k
    10·1 answer
  • Walter’s health insurance premium increased by 22 percent this year. Now he pays $488 every month for health insurance. What was
    10·1 answer
  • How to eject a flash drive from chromebook?
    6·1 answer
  • (50 points) Write a programthat adds the first and last elements of an integer array and stored as the first element of the outp
    12·1 answer
  • Describe the 3 different types of authentication
    6·2 answers
  • The ________ view in access looks similar to an excel spreadsheet.
    5·1 answer
  • Write a note on secondary storage​
    11·1 answer
  • How to program a game​
    7·2 answers
  • Which part of a computer is responsible for executing the software programs?
    10·1 answer
  • Which of the following is/are used in multimedia?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!