1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
12

A variable used as a subscript should be initialized to ________.

Computers and Technology
1 answer:
jeyben [28]3 years ago
6 0
The answer is d. Two
Two variables referring to the same array object
You might be interested in
When you move into a new home or apartment, the first thing on your checklist should be to have the ____________ changed. (5 Let
Lynna [10]

Answer:

When you move into a new home or apartment, the first thing on your checklist should be to have the <u>locks</u> changed

Explanation:

Changing the locks

Given that the way the previous owners of the new home or apartment made use of the locks and the keys are usually not completely known to the new owners, one may never know all those that have a key or a means to gain access into the apartment or home. Therefore, in order to guarantee proper security, it is a good practice to have as one of the first thing on the checklist, the changing of the locks of the entrance doors and windows of the new home or apartment.

5 0
3 years ago
Given an char variable last that has been initialized to a lowercase letter, write a loop that displays all possible combination
Free_Kalibri [48]

Answer:

for (char i='a'; i<='e'; i++){

   for (char j='a'; j<='e'; j++){

       cout << i<< j<< "\n";

   }

}

Explanation:

The loop runs all characters from the inner while the outer holds one character, by doing so, a will be matched with a,b,c,... Like wise b,c,d,... and on it goes.

8 0
3 years ago
How computer viruses spread from one computer to another​
morpeh [17]
Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.
8 0
3 years ago
Write the code to call a CSS file named "exam.css".
katen-ka-za [31]

Answer:

 <link rel="stylesheet" href="exam.css">

Explanation:

href is the file name assuming its in the same path

also get an extension called grepper, it helps debug a lot quicker

7 0
2 years ago
Read 2 more answers
I’ll mark brainliest, thanks
Mrrafil [7]

Answer:

if that is a tutorial, than just hit submit, the teacher doesn't see it.

Explanation:

i do online schooling on the same website

7 0
3 years ago
Read 2 more answers
Other questions:
  • The user interface design principle that places an emphasis on the intuitive flow of the interface (i.e. left to right and top t
    12·1 answer
  • Which is missing in most areas that do not have Karst topography?
    10·2 answers
  • _________ is a specially formatted request used to perform ip address to data link address resolution.
    14·1 answer
  • What does ADSL stand for?
    6·2 answers
  • Corey set up his presentation for delivery to his team. The information he had to convey was critical to their job performance.
    6·3 answers
  • What is a help desk
    15·1 answer
  • Taday is the anniversary of September 11, 2001. you were to meet the child of a victim or survivor of 9/11, what would you say t
    14·1 answer
  • Explicit knowledge can be documented and codified, whereas tacit knowledge encompasses insights, judgment, creative processes, a
    9·1 answer
  • Distance Traveled The distance a vehicle travels can be calculated as follows: For example, if a train travels 40 miles per hour
    15·1 answer
  • (ACCESS 2016)
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!