1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
3 years ago
13

Which of the following is NOT true about variables?

Computers and Technology
1 answer:
VikaD [51]3 years ago
3 0

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The value stored by a variable can be changed after it is assigned(true).

The value of a variable can be changed after it is assigned, for example:

int a=10;

and we can change the value of variable a in letter program such as:

a=15;

Variables are a name for a spot in the computer's memory (true).

it is true, because the variables value stored in the computer's memory and we can access theses values by their name (variable name). so Variables are a name for a spot in the computer's memory.

Variable names can be words: such as temperature or height (true).

Yes, the variable name can be words such as height, width, temperature etc.

The value stored by a variable cannot be changed after it is assigned (false).

It is noted that the value stored by a variable can be changed after it is assigned. However, it is noted that is some programming language, you can't change the value of static variable.

You might be interested in
Design a generic post-implementation evaluation form. The form should consist of questions that you could use to evaluate any in
irina1246 [14]

Answer:

Project Identification

Provide the identifying information associated with the project, including the applicable project control code, system acronym, and system title.

System Proponent

Provide the name of the System Proponent.

History of the System

Briefly describe the system’s history and predecessor, if any.  State the mission needs and information requirements, including how the system is expected to help users.

Functional System Description and Data Usage

Briefly describe what the system does functionally and how the data are used by the system.

Explanation:

Overview

The Post-Implementation Review is used to evaluate the effectiveness of the system development after the system has been in production for a period of time (normally 6 months).  The objectives are to determine if the system does what it is designed to do: Does it support the user as required in an effective and efficient manner? The review should assess how successful the system is in terms of functionality, performance, and cost versus benefits, as well as assess the effectiveness of the life-cycle development activities that produced the system.  The review results can be used to strengthen the system as well as system development procedures.

The review is scheduled to follow the release of a system or system revision by an appropriate amount of time to allow determination of the effectiveness of the system.  A representative from the functional development group or other member of the major user organization participates in the review.  The System Proponent ensures that all documentation and all personnel needed to participate in the review are accessible.

The reviewer and an assigned team collect the information needed for the Post-Implementation Review by interviewing end users and their managers, system administrators, and computer operations personnel.  The report is then prepared and provided to the user organization that requested it and the information systems organization, which may jointly use the findings to initiate other actions.

The Post-Implementation Review is a free-form report, and not all sections are relevant or necessary to the final product.  A description of the Post-Implementation Review Report is attached.

3 0
3 years ago
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
What is a quasi vpn?
Natasha2012 [34]

Answer:

i don't think there is such thing as a quasi vpn

Explanation:

6 0
3 years ago
legacy application that has hard-coded static IP addresses and is running on an EC2 instance, what is the best failover solution
AlladinOne [14]

Answer:

Elastic IP address

Explanation:

Elastic IP addresses are static, persistent public IP addresses which can be associated and disassociated with the instance, as required.

This will provide the best failover solution that will keep same IP address on a new instance.

6 0
3 years ago
Which of the following is a Reach Key on your keyboard?
zhannawk [14.2K]

Answer:J key

Explanation:I want my brainlyiest pls

6 0
2 years ago
Other questions:
  • You just came back to your office from a meeting about is security.​ you've learned a few things about a​ "good" password, and y
    15·1 answer
  • PLEASE HURRY
    13·2 answers
  • In each iteration, selection sort (small) places which element in the correct location?
    9·1 answer
  • Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion
    8·1 answer
  • Interactive sites where users write about personal topic and comment to threaded discussion are called?
    10·2 answers
  • Assume an ArrayList and a Linked List each contain 10,000 items. Which operation is performed fastest
    14·1 answer
  • 3.5 Code Practice: Question 1<br> (Website: Edhesive)
    14·1 answer
  • I have a question, but it's not a math question. Can anyone give me 5 unblockers for school computers? If you answer this, you w
    5·2 answers
  • I will give brainyest
    15·2 answers
  • What name is given to any changes to the original data such as users manually modifying data, programs processing and changing d
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!