1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pychu [463]
4 years ago
11

Which one of these variables has an illegal name?

Computers and Technology
1 answer:
4vir4ik [10]4 years ago
6 0

Answer:

c.$my-Var

Explanation:

u can use an underscore or join together but you cant use it in that form

You might be interested in
Hazel has just finished adding pictures to her holiday newsletter. She decides to crop an image. What is cropping an image?
Ilya [14]
B) cutting off part of the image

hope it helps
3 0
3 years ago
How do spear phishing attacks differ from standard phishing attacks?
mina [271]

Answer:

Phishing attacks normally target random people on mass amount by sending emails to users. In the other hand the spear phishing only targets 1 person hence the name "spear".

Hope this help please give the brainliest award.

5 0
3 years ago
Which open-sourced packet capture tool uses linux and mac os x operating systems?
Leto [7]

Tcpdump is an open-sourced packet capture tool which uses Linux and Mac OS X operating systems.

<h3>What is tcpdump?</h3>

Tcpdump can be defined as an open-sourced packet capture tool that is typically used to monitor and record TCP/IP traffic that are passing through a network and most Unix-like operating systems such as Linux.

This ultimately implies that, tcpdump is an open-sourced packet capture tool which makes use of Linux and Mac OS X operating systems.

Read more on tcpdump here: brainly.com/question/14485515

#SPJ12

5 0
3 years ago
A Python data model defining the state of a game for Tic-Tac-Toe. You must fully describe the notion of a state of the game, lim
Artist 52 [7]

Answer:

Check the explanation

Explanation:

Here in this game of Tic-Tac-Toe, it is using the TPGE engine which is a Tiny Python Game Engine. Let's talk about its functions like:-

def image_type(img): In this function, it is simply taking image as a parameter and returning its object type like DISC if the image is in graphical form, TEXT if it is a string, and LINE if it is other than the mentioned object.

def convert_image(img):  In this function, it is simply taking image as a parameter and returning an equivalent graphical object as understood by John Zelle's. Mainly comparing for three things in this function and those are: if image equals to DISC then it is calling convert_circle(function), if image equals to LINE then it is calling convert_line(function), and if image equals to TEXT then it is calling convert_text(function),

def convert_circle(x): This function takes a list( a group of values) and makes a circle at the center of the window and the circle's radius is coming from the list.

convert_text, convert_line, convert_circle are only creating text, line, and circle and then returning it.

def graphical_elements(images): This function is taking image as a parameter and then extracting shape and color from the image and then calling convert_image(shape) and convert_type(shape) and it gives us graphic and kind respectively. Now it is checking whether kind equals to DISC If yes then filling color on the window else, setting the outline of the window

def run(): Here it is finally running the game with required parameters, the whole game is continously running under the while loop.

That's all

8 0
4 years ago
Many application controls are useful for enhancing the reliability of both transaction data and master record data. This applica
Rzqust [24]

Answer:

True

Explanation:

In most accounting software like SAP, Application control performs what is known as validity check.

And Validity check is when this application control compares the data entered into a field for a transaction to that in a master record to verify the data entered exists.

With above definition we can infer that the question statement is true.

5 0
3 years ago
Other questions:
  • Which actions can be performed on tables in Word? Check all that apply.
    13·2 answers
  • The operating system, and in particular the scheduler, is not an important component of a real-time system.
    14·1 answer
  • Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the ap
    14·1 answer
  • Moving read emails to a folder is a great way to stay organized. <br> A) True <br> B) False
    7·2 answers
  • Which of the following statements is true?
    8·2 answers
  • private members of a class are accessible only from _____________ of the same class or from their friends
    12·1 answer
  • Why would online learning make you lazy
    13·1 answer
  • What are non-examples of wage and salary?
    7·1 answer
  • Which word or phrase refers to an increasingly common method of computing and storing files?
    15·2 answers
  • What is wrong here??
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!