1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kay [80]
1 year ago
10

within the data set hrd.temp, payrate is a numeric variable and hours is a character variable. what happens when the following p

rogram is run? data work.temp; set hrd.temp; salary
Computers and Technology
1 answer:
Fantom [35]1 year ago
6 0
  • SAS converts the PayRate value to a numeric value form; a message is written in the form of a log

  • SAS can be defined a comprehensive statistical software that provides a wide variety of analytical capabilities, data management, and visualization options

   

  • Compare between SAS and Python

Python is a high-level programming language, more object-oriented, and is known by all programmers.

In addition, python also includes a modern programming language.

Python is a programming language that has evolved from previous programming languages.

But in terms of learning, SAS is a programming language that is easier to follow compared to python.

These are the advantages and disadvantages of each programming language

Learn more about programming language here brainly.com/question/23959041

#SPJ1

You might be interested in
Pie charts are best used for
Anna11 [10]

Answer:B

Explanation:Showing parts of a whole.

4 0
2 years ago
Please help me with this question. I don’t get it
Lelechka [254]
A - they all use microprocessors to compute and store data.
3 0
2 years ago
Read 2 more answers
Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an un
Paha777 [63]
<span>Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an unauthorized process to occur or by granting unauthorized access is known as: Malicious code
Malicious code is often created to steal some information from another user without they realizing it, such as address, credit card number, social security number, email password, etc.</span>
4 0
3 years ago
You receive an email that appears to legitimately be from your Bank. The email indicates the need for verification of your infor
anzhelika [568]

Answer:

phishing

Explanation:

6 0
2 years ago
Read 2 more answers
Explain how to implement two stacks in one array A[1..n] in such a way that neither stack overflows unless the total number elem
algol [13]

Answer:

Check explanation

Explanation:

Two stacks can make use of one array by utilizing various stack pointers that begins from different ends of an array. Looking at the array A[1...n], the first stack will drive elements that starts from position 1 as well as to move its' pointer to n.

The Second stack will begin at the n position and motion its' pointer to 1. The best likely divide is to offer each stack a half of an array. whenever any of two stacks transverse the half-point, an overflow can happen but for that overall number of elements, it must be n

5 0
3 years ago
Other questions:
  • A ___ block unauthorized access to a network or an individual computer
    8·1 answer
  • What does BMP stand for?
    10·2 answers
  • Text, numbers,graphics, sounds entered into a computer's memory during input operations are referred to as
    11·1 answer
  • 1. Given a sequential list with n numbers, represented in a one-dimensional array A) Write an algorithm to check if the list has
    14·1 answer
  • Write a C# solution for the following problem. Submit your .cs file to this link. Sample output(s) attached. == Create an Employ
    5·1 answer
  • A port is the point at which a peripheral device attaches to or communicates with a computer or mobile device. True False
    15·1 answer
  • What steps should a user take to create a secondary address book?
    8·2 answers
  • CMS is a content management system that collects, organization, publishes, and manages creative content. Right...?
    9·1 answer
  • The Fibonacci sequence begins with 0 and then 1 follows. All subsequent values are the sumof the previous two, for example: 0, 1
    11·1 answer
  • The second generation of computer languages is a higher-level language than
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!