1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fgiga [73]
3 years ago
14

Is there anyone who is learning coding if so then can you tell me how to be perfect in coding​

Computers and Technology
1 answer:
yarga [219]3 years ago
5 0

<u>Follow the below stated 10 steps to be perfect in coding:</u>

Step 1: Understand that there are no substitutes or shortcuts to learn programming codes.

Step 2: Find a trust-able site on the internet where you can learn programming online with the execution

Step 3: Start with the basic fundamental programming

Step 4: Try writing code on your logics

Step 5: Read the sample code (syntax) and try implementing those based on the logic provided

Step 6: Keep practicing daily - Dedicate a specific time for practicing daily

Step 7: Try writing code for others

Step 8: Start with small projects

Step 9: Write a program at least two or three times

Step 10: Breakdown your program; try permutation and combination to avoid errors.

You might be interested in
Which of the following correctly defines a procedure in computer programming? Choose all the apply.
Kazeer [188]

Explanation:

A code block programmers can reuse multiple times

3 0
4 years ago
Read 2 more answers
The scope of a temporary table is limited to what?
kari74 [83]

The scope of a temporary table is limited to the database session in which it's defined.

<h3>What is a database?</h3>

A database can be defined as an organized and structured collection of data that are stored on a computer system as a backup and are usually accessed electronically.

In database management system (DBMS), the scope of a temporary table is generally limited to the database session in which it's defined by a software developer or programmer.

Read more on database here: brainly.com/question/13179611

#SPJ12

8 0
2 years ago
How to contact list different from an address book
lisabon 2012 [21]

A contact list is different from an address book because your constancy list consist of people whom you know and choose to communicate with, while the address book gives you a list of the community’s residents phone numbers.



8 0
3 years ago
Read 2 more answers
What versions of Wi-Fi Protected Access (WPA) were defined after the IEEE ratified the IEEE 802.11i security standard
aliya0001 [1]

Answer:

John is good in math rewrite it and punctuate

8 0
3 years ago
0.6 tenths of an hour would be how many minutes?
astraxan [27]

Answer:

17 min bro

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • You have no control over who views your social network information
    13·2 answers
  • Programmers use a(n) ____ when they need the computer to repeatedly process one or more program instructions until some conditio
    13·1 answer
  • A ____ is several programs simultaneously processing the same I/O stream.
    7·2 answers
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • Which element is included in the shot breakdown storyboard? Which element is included in the shot breakdown storyboard?
    8·1 answer
  • a rule that states each foreign key value must match a primary key value in the other relation is called the
    5·1 answer
  • And<br>Why the computer is called dilligent<br>Versatile machine?give long answer ​
    10·1 answer
  • How does lower latency benefit the users connected to a network?
    14·1 answer
  • Which type of information should never be given out on social media?
    5·2 answers
  • Which of the following is/are used in multimedia?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!