1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
a_sh-v [17]
2 years ago
15

This code is supposed to accept a word as input, and then print that word to the screen.

Computers and Technology
1 answer:
atroni [7]2 years ago
3 0

The thing that happens if you type a number instead of a word in the given code is: The number is printed

This is because the code already assigned a variable to the input and it accepts both numbers and alphanumeric keys because it is an integer command.

<h3>What is Coding?</h3>

This refers to the use of programming that is used to give instructions to a computer system

Hence, we can see that The thing that happens if you type a number instead of a word in the given code is: The number is printed

This is because the code already assigned a variable to the input and it accepts both numbers and alphanumeric keys because it is an integer command.

Read more about coding here:

brainly.com/question/16397886

#SPJ1

You might be interested in
13. Place where names, addresses and email information<br> is stored
yanalaym [24]

Answer in ur email

Explanation:

8 0
3 years ago
La sentencia de ASIGNAR es una sentencia de entrada de datos, verdadero o falso ?
Akimi4 [234]

Answer:

sorry can´t understand langues

Explanation:

cant

7 0
3 years ago
Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion dete
gizmo_the_mogwai [7]

Answer: CPU

Explanation:

The management dashboard refers to the tool that's used in the presentation of the vital k management KPIs in a single place, which is efficiently managed in order to make faster and better decisions.

Based on the information given, after the application of intrusion detection, virus, and malware protection on the Linux images, he will notices an increase in CPU on his server management dashboard.

Therefore, the correct option is C.

5 0
3 years ago
____________________ memory is the ability to add RAM without shutting down the computer or operating system.
Liula [17]

Answer:

Hot-add

Explanation:

The computer system is a electronic device that is used to perform computational task on input data for a pre-dertermined result. The components of the computer is divided into hardware and software components.

The hardware components are the physical parts of the computer system, while the software component are the instructions that runs the system.

The RAM is a physical component that provides memory for running current activities on the monitor screen. When it is removed or faulty, the screen goes blank. To add more RAM memory to the system while the system is on, activate the hot-add memory settings.

4 0
3 years ago
What are two key elements of describing the environment?​ a. ​ Communication protocols and security methods b. ​ External system
pashok25 [27]

Answer:

B. External systems and technology architecture.

Explanation:

In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,

Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture

3 0
3 years ago
Other questions:
  • Discussion group may have a___________ who monitors the postings and enforces the sides rules​
    13·1 answer
  • What is the protocol in the web search at the bottom?
    13·1 answer
  • Lydia noticed that she feels tired and out of breath after walking her dog up a hill in the park. Which area of fitness does she
    8·1 answer
  • What port in your computer will you use to plug in your camera?
    14·2 answers
  • The primary key is a field that uniquely and completely identifies a record.
    14·2 answers
  • A computer record is used to store all the information about one transaction, but several such records must be used to store the
    12·1 answer
  • Whate is function of northe bridge<br>​
    12·1 answer
  • Kyle returns to work the next day and he would like to continue working on the document from yesterday. What should Kyle do?
    7·1 answer
  • Which backup requires a small amount of space and is considered to have an involved restoration process?
    15·1 answer
  • What is this line called that appears and disappears in the search box<br><br> WILL MARK BRAINLIEST
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!