1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimaraw [331]
3 years ago
10

What is basic statement made up of​

Computers and Technology
2 answers:
valentina_108 [34]3 years ago
6 0

Answer:

The answer is variables, constants, expressions and funcions.

tatyana61 [14]3 years ago
4 0
A BASIC program is composed of statements made up of variables, constants, expressions, and functions. BASIC statements can contain arithmetic, relational, and logical expressions. These expressions are formed by combining specific operators with variables, constants, or BASIC intrinsic functions. Hope it helps
You might be interested in
You have enabled IP routing on PLABSA01 after enabling the IPRouter in the registry. How will you verify whether the IP routing
drek231 [11]

Answer:

By typing ipconfig at the command prompt

Explanation:

To check if an ip router is enabled in a registry, simply do the following:

1. launch your command prompt from accessories in your windows start button

2. Type this command IPconfig

3. Strike the enter button on the keyboard

It will display the various pack of upload and download indicating how packages are routed.

4 0
3 years ago
Should a social network own our social data? Is it an invasion of privacy for social networks to collect and use the information
Svetradugi [14.3K]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

No, we don't even own our identity data on social networking sites. It may be said as permission is needed as an factor for recognizing an acceptable interpretation and solution to a circumstance as well as a method to be followed.

  • They would conclude that, in contemplating the data generated from social networking, this could be recognized that although the data that they left as our electronic fingerprints must be used with applications that can provide the businesses with the appropriate strategy to best reach the consumer.
  • With all this into consideration, the method of information gathering does not include personal identifying information, and also the reality that we must be made mindful of what details has been accessed as well as the right to get out of obtaining such details from the social platform.
3 0
3 years ago
What does this comparison block indicate?
natima [27]

Answer:

This comparison block indicates that the comparison is true if the left side is equal to the right side.

Explanation:

The comparison uses the = operator, which is the assignment operator in most programming languages. This operator is used to assign a value to a variable. In this case, the comparison is checking whether the value of the getItem variable is equal to 5. If the value of getItem is equal to 5, then the comparison will evaluate to true. If the value of getItem is not equal to 5, then the comparison will evaluate to false.

5 0
1 year ago
Which element is the first thing you should complete when making a movie?
AlekseyPX

Answer:

storyboard!!!

Explanation:

its important to have the concept in mind before starting

6 0
3 years ago
Read 2 more answers
Analyze the following code. II: public class Test { public static void main(String[] args) { System.out.println("Welcome to Java
Grace [21]

COMPLETE QUESTION

I. public class Test {

public static void main(String[] args){

System.out.println("Welcome to Java!");

}

}

II. public class Test { public static void main(String[] args) {System.out.println("Welcome to Java!");}}

Answer:

Both codes will compile and run and display Welcome to Java, but the code in II has a better style than I

Explanation:

When written codes, paying attention to proper coding styles and efficient memory management enables us to create programs that are highly efficient, coding styles refer to proper indentions and avoiding too lenghty lines of code (as is in code I), adding approprite comments etc.

8 0
3 years ago
Other questions:
  • Which best describes the difference between stocks and bonds ?
    8·2 answers
  • The process of analyzing data to extract information not offered by the raw data alone; it uncovers trends and patterns using te
    6·1 answer
  • TRUE OR FALSE: If I ask you to span multiple rows in your table, that means that two columns will merge together
    5·1 answer
  • The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas
    7·2 answers
  • What is the Internet address of the speech you listed to?
    14·1 answer
  • Stages of reverse engineering
    8·1 answer
  • A client has gathered a very large amount of operational data, but struggles with how to apply Artificial Intelligence (AI) to a
    10·1 answer
  • Need the answer ASAP!!! I’ll mark brainliest if correct
    5·1 answer
  • Imagine that you need to prepare for three end-of-term tests. What steps will you take to make sure your study time is well spen
    5·1 answer
  • Suppose that​ 30% of the female students and​ 40% of the male students in a college history class are from a major city. If ther
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!