1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madreJ [45]
4 years ago
14

You may declare an unlimited number of variables in a statement as long as the variables are ____.

Computers and Technology
1 answer:
k0ka [10]4 years ago
6 0

Answer:

b. the same data type

Explanation:

Any number of variables can be declared in a statement as long as the variables have the same data type. For example:

1) int a,b,c,d,e;

Here each of the declared variables a,b,c,d,e have the type int.

2) char p,q,r,s,t,u,v,w;

In this case variables p to w all have the type char.

3) float x,y,z;

x,y and z are all of type float.

You might be interested in
How can chess computers be programmed so that it can be so accurately adjusted to a skill level ranging from a beginner to a gra
Elis [28]
They are artificially intelligent. They watch thousands of hours of videos of the game they are going to play. After they learn, they challenge themselves against themselves and save all the moves it used that time, they play another game against the saved game and if they best it then they save the new and repeat. I am not sure about this because I am just a 15 yr old but the early ones brute forced the game and one. Brute Forcing is a way to try out every possible move and pick the most like to succeed or the most efficient one, brute force is also used in hacking or cracking passwords that have something in common. Like let's say ur password is Jakeis35. I would make a list that would be:
Jake
jake
Is
is
35
34

and with a software it will put together every possible pair and will stop when it matches the password on the server or if the password let it login.
5 0
3 years ago
What type of editor is used to edit HTML code?What type of editor is used to edit HTML code?
Law Incorporation [45]

For learning HTML we recommend a simple text editor like Notepad (PC) or TextEdit (Mac).

mark me brainliestt :))

4 0
3 years ago
Helo me pleace! Cartoons Disney answer! How many Dalmatian puppies are in Pongo and Perdita’s litter?
Sindrei [870]
15 puppies :) I hope this helps!
5 0
3 years ago
In order to paint a wall that has a number of windows, we want to know its area. Each window has a size of 2 ft by 3 ft. Write a
Eva8 [605]

Using the knowledge in computational language in JAVA it is possible to write a code that write a program that reads the width and height of the wall and the number of windows, using the following prompts

<h3>Writting the code:</h3>

<em>import java.util.Scanner;</em>

<em>public class WallArea {</em>

<em>    public static void main(String[] args) {</em>

<em>        Scanner sc = new Scanner(System.in);</em>

<em>        final int areaOfWindows = 6;</em>

<em>        System.out.print("Wall width: ");</em>

<em>        double width = sc.nextDouble();</em>

<em>        System.out.print("Wall height: ");</em>

<em>        double height = sc.nextDouble();</em>

<em>        System.out.print("Number of windows: ");</em>

<em>        double numberOfWindows = sc.nextDouble();</em>

<em>        double area = (width * height) - (numberOfWindows * areaOfWindows);</em>

<em>        System.out.println("Area: " + area);</em>

<em>    }</em>

<em>}</em>

See more about JAVA at brainly.com/question/12975450

#SPJ1

4 0
2 years ago
E-mail administrators may make use of _________________, which overwrites a log file when it reaches a specified size or at the
Karolina [17]
E-mail administrators may make use of Circular Logging which overwrites a log file when it reaches a specified size or at the end of a specified time frame.​Circular logging<span> is a method or feature used to conserve hard disk space by overwriting individual log files, thus keeping the transactional  log to a minimum.</span>
7 0
3 years ago
Other questions:
  • 20. Which of the following describes an acceptable print resolution?
    10·2 answers
  • To paste text with the same formatting as the document in which it is entered, select _____ from the Paste menu. Keep Source For
    12·2 answers
  • Class CTRivers describes collection of CT rivers. It has no data, and it provides the following service methods. None of the met
    13·1 answer
  • The computer output for integer programs in the textbook does not include reduced costs, dual values, or sensitivity ranges beca
    14·1 answer
  • Give an example of at least one information system you know or have heard of.
    9·2 answers
  • Write a loop that continually asks the user what food the user has in their refrigerator until the user enters apples, in which
    10·1 answer
  • When text is used as a Hyperlink, it is usually underlined and appears as a different color.
    11·1 answer
  • Search the Web for three different employee hiring and termination policies. Review each and look carefully for inconsistencies.
    5·1 answer
  • __________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a maliciou
    10·1 answer
  • Kevin would like to ensure that his software runs on a platform that is able to expand and contract as needs change. Which one o
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!