1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djyliett [7]
3 years ago
9

You can separate words in a macro name by using the ____ character

Computers and Technology
2 answers:
Maru [420]3 years ago
8 0
You can separate words in a macro name by using the underscore character.

A macro is considered as a small reusable computer program. It is efficient as it helps you save time by automating any repeated task.
In order to create a macro, you do not need to be an expert in programming, however, a little knowledge about it will help.

Igoryamba3 years ago
4 0

A macro is a fragment of code which has been given a name. The name of a macro is a unique string that begins with a letter or a @, #, $, _ symbol. You can separate words in a macro name by using the underscore character. This character tells  that the current statement isn't finished yet and it continues on the next line. So, it's used to split a single line of code over two lines.

You might be interested in
What makes Darth Vader's sound so sinister, menacing and evil?
olganol [36]

Answer:

The volume, special effects, and the content of the speech.

Explanation:

The volume and special effects make all video productions's tone clearer. The words that Darth Vader speaks also adds to his "bad guy" character.

3 0
4 years ago
Read 2 more answers
Knowing what you know now about frequency analysis, would you feel comfortable sending your password over the Internet using a s
Vikki [24]
According to my opinion, NO, I'd not feel comfortable.

Substitution ciphers in the world of encryption can be cracked very easily. By looking for patterns like one letter words, double letter patterns, and knowing rules such as all words must contain at least an a, e, i, o, u or y, you are probably able to decipher this with so much ease. While this information and the frequency of letters used in the encrypted message might be helpful, it might not be a perfect process.


8 0
3 years ago
Read 2 more answers
Brainiest To Best Answer!! Java coding help, can you tell me what Switch and Case does using the example below?
fiasKO [112]
The switch statement is an n-way branch. An n-way branch can branch to any of an arbitrary number ( n ) of branches. An if statement can branch two ways, whether the condition is true or false.

The example you gave is a great example of how how code is written can make the code make sense or not.

public void setQuiz( int quiz, int grade )
{
  switch( quiz )
  {
    case 1: // if quiz == 1
      grade1 = grade; //where was grade1 declared?
      break;  // otherwise execution will continue through the next case block
    case 2: // if quiz == 2
      grade2 = grade;
      break;
  }
}

The variable named in the switch statement is tested against each case statement and whichever case statement's value matches, the rest of the switch statement's code is executed. (That's why the break statements are needed) Usually switch statements are written with a default case at the end as a "catchall".
4 0
4 years ago
What does it mean for a heap to be complete?
Dmitry [639]

Answer:

 A complete heap is a heap in which the all the nodes are completely filled and the level of the each node are equal to each other. So, if the heap satisfied this condition then, the heap are complete.

In the computer science, heap is the special type of tree based on the data structure. Binary heap is one of the type of heap and it become complete binary tree when, it satisfied the ordering of heap property.

There are basically two types of heap ordering that are:

1) MAX heap property: In the max heap ordering property each node are less than or equal to its parent node value.

2) MIN heap property: In the min heap property each node is greater and equal to its particular parent value.

3 0
4 years ago
Top secret mission lolz
mixer [17]

Answer:

?

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • 2. Identify the diagram and define it.<br>13. What are pollen grains ?<br>4. What is an embryo?​
    12·1 answer
  • After a file downloads, you can do any of the following except
    13·1 answer
  • Methods used to change variables are called ______. equals accessors toString void mutators
    5·1 answer
  • As a safe driver, you cannot, __________
    13·1 answer
  • An ordinary office environment needs computers that have multiple user account settings where each user is allocated private dat
    13·1 answer
  • What is a software? 2 sentences please, I'll mark u as brailiest
    12·1 answer
  • which feature of organisations to manage needs to know about to build and use information system successfully
    6·1 answer
  • Which best describes sorting, filtering, and deleting records?
    6·1 answer
  • Please please help I don’t understand this
    7·2 answers
  • Computers and their input and output devices require power to work and may have many power cords. What is the safest way to orga
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!