1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WARRIOR [948]
3 years ago
15

Variables are: Group of answer choices Operators that perform operations on one or more operands. Symbolic names made up by the

programmer that represents locations in the computer's RAM. Symbolic names made up by the programmer whose values cannot be changed. Reserved words.
Computers and Technology
1 answer:
mezya [45]3 years ago
5 0

Answer:

Symbolic names made up by the programmer that represents locations in the computer's RAM

Explanation:

Variables refer to memory location that has a name and holds a value of a particular type.

In most programming langauges a variables must be declared before it can be used in the program. Declaration means giving the variable a name according to some established rules and mentioning its data type. The popular types are integers (whole numbers), floats (floating point) and String(sequence of characters)

Some examples of variables' declarations and initializations are given below

int a = 5; //This declares a variable called a of type integer with a value of 5

float b = 1.2; //This declares a variable called b of type float with a value of 1.2

String name = "David" //This declares a variable called name of type String with a value of David

You might be interested in
A Gym Masters system programmer has just installed the first Windows Server 2016 sys- tem and now needs to do an initial configu
ZanzabumX [31]

Answer:

Windows Server 2016 comes in standard and data center editions and offers several types of installation for both: Desktop Experience (full GUI mode), Core (no GUI mode).

We'll be using the Core version which makes use of the command prompt as the main tool.

To begin the server configuration, After opening the command prompt, she needs to enter the “Sconfig” command

The configuration tasks are as follows;

1. Change the Name of the Computer

  • Type 2, and press Enter
  • Enter the new Computer Name and press Enter
  • You'll see  prompt as dialog box with the message "the computer needs to be restarted in order to complete the operation successfully” Click OK.
  • then another pops up as "You must restart your computer to apply these changes, Restart now?", Click YES.

2. Enable Remote Desktop

  • you can start again after the Restart, by  entering the “Sconfig” command
  • From the main menu, type "7" as the option number, press enter and options will be displayed
  • enable Remote Desktop for Clients running Remote Desktop with Network Level Authentication
  • enable Remote Desktop for clients running any version of Remote Desktop

3. Perform Network Settings

Here, the IP address can be configured to be assigned automatically by a DHCP server or you can assign a static IP address manually.

  • type "8" from the main menu and press Enter.
  • a list of available network adapters that are attached to the server is shown, then Type 1, or the index number of the adapter that you want to configure, and then press Enter.
  • the current configuration for the network adapter that you selected is displayed.
  • Now type 1 and press Enter to configure the IP address for the selected network adapter
  • Select option 1 and type S, then press Enter to manually assign a static IP to the network adapter.
  • Type in the static IP address, and then press Enter
  • Type in the Subnet mask, and then press Enter
  • Type in the default gateway, and then press Enter
  • Select option 2; by typing 2 and press Enter
  • Type in the preferred DNS server, and then press Enter.
  • You will be prompted with “Preferred DNS server set.” Click OK.
  • Type in the alternate DNS server, and then press Enter.
  • You will be prompted with “Alternate DNS Server set.” Click OK.

4. Connect ISCSI Shared Storage

  • open the command prompt
  • open Microsoft ISCSI initiator by entering “iscsicpl” into the command line
  • type in the IP address or DNS name
  • connect your storage via the iscsi target storage server IP address by Clicking Connect.

5. Format SCSI Storage Disk

  • open the command prompt
  • type “diskpart” and press Enter
  • type “list disk” to see all the disks available on the server
  • select disk 1
  • “online disk” and “attributes disk clear” commands can be used to bring the disk online and to check if the partition is writable.
  • Next, type “list partition” to see available disk partitions under a server
  • Choose the partition you need with the “select partition 1” or which ever number is designated to the partition.
  • type in “format fs=NTFS” to format the partition
  • type in the “assign letter=F” command to assign a letter to the partition

Done.

6 0
4 years ago
State and derive the law of conservation of energy​?
mash [69]

Answer:

The law of conservation of Energy states that energy can never be created nor destroyed.

Explanation:

3 0
4 years ago
Read 2 more answers
The __________ operator increases the value of the variable by 1 after the original value is used in the expression in which the
Irina18 [472]

Answer:

postincrement.

Explanation:

In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information that can be modified or edited.

Basically, variable stores information which is passed from the location of the method call directly to the method that is called by the program.

For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function. Therefore, when you create variables in a function, you can can set the values for their parameters.

The postincrement operator increases the value of the variable by 1 after the original value is used in the expression in which the variable appears.

7 0
3 years ago
Suppose that we want to enhance the processor used for Web serving. The new processor is 10 times faster on computation in the W
elena55 [62]

Answer:

The overall speedup gained by incorporating the enhancement is 1.563

Explanation:

Using Amdahl's Law;

The overall speedup  (N) =\dfrac{1}{(1-P) + ( \dfrac{P}{n})}

where;

P = Fraction Enhanced for Old Processor

n = speedup enhancement as a result of the new processor

P = 40% = 0.40  and n = 10

∴

The overall speedup (N) is:

=\dfrac{1}{(1-0.4) + ( \dfrac{0.4}{10})}

=\dfrac{1}{(0.6) + ( 0.04)}

=\dfrac{1}{0.64}

= 1.563

Thus, the overall speedup gained by incorporating the enhancement is 1.563

3 0
3 years ago
Give examples of two IP addresses (that are 100 IP addresses away from each other but the last octet is not greater than .150) t
aniked [119]

Answer:

Explanation:

255.255.255.0 is the Subnet for the network DCI, it makes it a workable network to allow 254 users.

It as an IP address exclusion range between 192.168.42.100 - 192.168.42.110, this makes it overall accessible through X. X.X.1 - 99 and X. X. X - 110 - 252.From this, 90 address are being used, so 2 addresses can be picked as 192.168.42.6 and 192.168.42.106. These are 100 addresses apart, and the final Ocet is not more than 150.

3 0
3 years ago
Other questions:
  • The Modified Greiss chemical test is used to detect the presence of what chemicals that indicate muzzle to target distance?
    11·1 answer
  • Who found a way of making the steam engine more efficient?
    9·2 answers
  • Write two statements to get input values into birthMonth and birthYear. Then write a statement to output the month, a slash, and
    5·1 answer
  • What is the main type of energy used to help convert metamorphic rocks into igneous rocks in the rock cycle ?
    10·1 answer
  • Which entity has the principal responsibility to control the execution of processes?
    14·1 answer
  • When nat hides the source ip of an originating device, this is known as ________?
    15·2 answers
  • Which of the following identifies the patterns used for each data series in a chart?
    12·1 answer
  • What are the disadvantages of using photo editing software in photography?
    14·1 answer
  • A collection of wiress connecting the CPU with main memory that is used to identify particular location is called
    13·1 answer
  • // This pseudocode segment is intended to compute the number
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!