1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nordsb [41]
3 years ago
13

What happens when variables in programming are not properly initialized? answers?

Computers and Technology
1 answer:
Romashka-Z-Leto [24]3 years ago
6 0
Errors in compilation happen, or it runs but then doesn't recognize the input. Also you can't transform into other types of variables.
You might be interested in
How to design remote access policy using the appropriate access controls for systems,applications, and data access
nata0808 [166]

Answer:

All remote access users connect to the network and maintain all security standards on the device including

Valid and virus protection

Malware protection

Maintain the OS

Explanation:

The remote access policy applies to employees and other affiliates who owned devices to remotely access the Network CCC. The remote policy access connection is used to perform the work activities on the behalf of CCC. Remote access system, application and can be accessed with the internal CCC network. Example of application are as follow:

Internal Academic System

Internal websites

Documents files on internal file

Local colleges resources

Servers

Remote access will be managed by System Data Center and use security measures based on requirements.

Remote access is provided as an extension of the normal work environment.

Review the CCC information technology for protecting information via the remote method.

The employee will use remote procedures. Employees disclose the passwords and if the business is conducted from home.

All remote access includes a "time-out" system. In accordance with CCC and will time out the specified period of inactivity.

The access users accept the access and connection to networks and monitored to record dates, time. Identify accounts and have been compromised by external parties.

The remote access user may be listed in the remote access application.

4 0
2 years ago
Which of the following will increase the level of security for personal and confidential information on a mobile device if the d
Soloha48 [4]
I believe is a and c.
8 0
3 years ago
[1] Our son has started playing organized T-ball, a beginner’s version of baseball. [2] “Organized” is what parents call it, any
k0ka [10]
I think it is 3 no? Maybe I dunno but I am confident
6 0
3 years ago
Read 2 more answers
Write a Coral program using integers userNum and x as input, and output userNum divided by x four times.
ss7ja [257]

Answer:

second_int = "Enter the second integer: "

usernum = int(input("Enter the first integer: "))

x = int(input(second_int))

usernum = usernum // x

print(usernum, end= ' ')

usernum = usernum // x

print(usernum, end= ' ')

usernum = usernum // x

print(usernum, end= ' ')

usernum = usernum // x

print(usernum)

Explanation:

im good

7 0
2 years ago
A portable electronic device that can be used in an emergency to stop someone’s heart from going out of rhythm is called a/an
JulsSmile [24]
It is called a Heart pace maker
7 0
3 years ago
Read 2 more answers
Other questions:
  • Write the importance of cyber law? In point .<br>​
    10·2 answers
  • The posterior auditory stream terminates in the ________ and is involved in ________.
    12·1 answer
  • Explain why Windows and Linux implements multiple locking mechanisms. Describe the circumstances under which they use spinlocks,
    13·1 answer
  • Write a program in which given an integer num, return the sum of the multiples of num between 1 and 100. For example, if num is
    7·1 answer
  • Thank you very much for your email. ...... was very interesting​
    15·1 answer
  • How should a Salesforce Admin fulfill those requirements? Universal Containers launches a Partner Community for their resellers
    13·1 answer
  • HELP!!! Bad things about Helen Keller. I'm doing a debate and i need to prove that Steve Jobs is better than Helen Keller!!
    14·1 answer
  • What is the difference between web and internet ?
    10·1 answer
  • 27. If X and Y are int type variables,
    14·1 answer
  • Your connection to this site is not secure how to fix.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!