1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrews [41]
3 years ago
8

In programming, what is a string?

Computers and Technology
2 answers:
LenKa [72]3 years ago
8 0
A way to store a sequence of letters, numbers, or symbols but it’s not always true!
Alla [95]3 years ago
7 0

A way to store a sequence of letters, numbers or symbols.

This is the most accurate statement, though not entirely true.

Hope this helps.

You might be interested in
What is the unofficial name given to the culture that has emerged from living in the age of digital media, whereby people are fr
gizmo_the_mogwai [7]
The digital age has grown to a point that it permeates every area of our day to day lives. It is known to directly affect our ability to concentrate ... and smartphones in particular, with constant incoming notifications from various sources of interest that are always within reach, present a particularly powerful and consistent distraction. Therefore, I would say that "culture of distraction" is an apt descriptor.
4 0
4 years ago
Read 2 more answers
What is a statement that runs only under counting conditions?
IRINA_888 [86]

Answer:

An if statement

Explanation:

An if statement runs provided the logical requirement is satisfied.

7 0
3 years ago
Terry is having a problem with his computer screen. He said the screen looks distorted. When you go to check his monitor, you no
sp2606 [1]

Answer:

C. The computer's resolution has been set too low

Explanation:

When the screen of a system looks distorted and the desktop icons do not appear properly, it's a sign of low screen resolution.

This is often caused by the lack of proper display driver.

To fix this, one need to update the graphic driver. The graphic card is always available on the manufacturer's website for download download of latest drivers.

Also, screen resolution can be changed by performing the following tasks.

1. Goto Control Panel

2. Under Appearance and Personalization, click Adjust screen resolution.

3. Click the drop-down list next to Resolution,

4. Move the slider to the resolution you want

5. Click Apply.

5 0
4 years ago
5. How do vector graphics used with CRT technology work? List at least one of vector graphics’ advantages over raster graphics,
alekssr [168]
<span>Please see that Raster graphics are made up of pixels whereas Vector graphics are composed of paths, therefore the advantage of vector graphics is useful for creating images made up of line based components, such as Texts, polygons etc. Asteroids was a vector graphics based classic game.</span>
7 0
3 years ago
Which of the following is a major difference between XSS attacks and remote code exploits?
Dafna1 [17]

Answer:

Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Explanation:

  • XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
  • This involves sending server side scripts which are executed by the user and these may even change the html pages too.
  • Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
  • This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
  • In this type of attack, the attacker tries to inject the code remotely.
  • Option (c) is correct and options (a),(b) and (d) are wrong options.
4 0
3 years ago
Other questions:
  • A switch operates in the OSI reference model __________ layer and uses the __________ address to forward packets.
    8·1 answer
  • Which best describes IMEI?
    7·1 answer
  • The ____ contains all data definitions for a database, including table structures, security information, relationships between t
    11·1 answer
  • Jim maintains attendance records for his employees for the year. Row B includes the dates of attendance, and column A includes t
    5·2 answers
  • Which of the following contains hardware systems similar to the affected organization but does not host live data?
    13·1 answer
  • In this line of code, what does 144 refer to?
    12·1 answer
  • Which is a concept of the CIA of Computer Security
    7·1 answer
  • Please help.........​
    13·1 answer
  • 4. In computers, an integer can be represented by more than 8-bit, what is the largest positive integer that
    9·1 answer
  • Similarities between incremental and<br> prototyping models of SDLC
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!