1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
3 years ago
6

Enumerations can contain ___________ values.

Computers and Technology
1 answer:
NISA [10]3 years ago
7 0

Answer: (A) Only unique

Explanation:

 Enumeration basically contain only unique value as enumeration is define as the set of the numeric values that is finite and it is represent specifically by the identifiers which is known as the enumeration constant.  

It only work with the finite values and also hide all the un-relevant and unnecessary information from the programmers. Enumeration is the type of the data type variable which contain only previous declared values.  

You might be interested in
Alicia uses a software application to store the names, email addresses, and phone numbers of her friends in alphabetical order. 
SpyIntel [72]

I think she's using Excel.

6 0
3 years ago
What is the difference between requirements and controls in the security process? Give examples of each.
konstantin123 [22]

Answer:

Security controls are those measures taken to prevent, identify, counteract, and reduce security risks to computer systems, whereas, Security Requirements are guidelines or frameworks that stipulates measures to ensure security control.

Explanation:

Security controls encompass all the proactive measures taken to prevent a breach of the computer system by attackers. Security requirements are those security principles that need to be attained by a system before it can be certified as safe to use.

Security controls are of three types namely, management, operational, and technical controls. Examples of technical controls are firewalls and user authentication systems. A statement like 'The system shall apply load balancing', is a security requirement with an emphasis on availability.

4 0
3 years ago
Diane changes the size of an image with the format picture pane and keeps the original ratio of height to width of the object. W
bixtya [17]

Answer:

it's d.  

Explanation: post protected

7 0
3 years ago
Add a function named circle to the polygons module. This function expects the same arguments as the square and hexagon functions
PolarNik [594]

Answer and Explanation:

import Circle

#include<conio.h>

void main ()

int t , length , n

//for hexagon

def hexagon(t, length, n):

 for _ in range(n):

 t.fd(length)

t.lt(360 / n)

square = Circle.Circle()

square.penup()

square.sety(-270)

square.pendown()

hexagon(square, 30, 60)

5 0
3 years ago
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. Yo
krok68 [10]

Answer:

have the same SSID but different channels

Explanation:

Based on the information provided within the question it can be said that the best option to accomplish this would be to have the same SSID but different channels. This would maintain the users connected to the same network name (SSID) but still be able to roam and jump from one access point to the other.

7 0
3 years ago
Read 2 more answers
Other questions:
  • I need help please <br> just plug in the words with their definitions.......
    10·2 answers
  • Which type of spreadsheet cell represents the left hand sides (lhs) formulas in an optimization analysis?
    5·1 answer
  • 1. _____ can’t be rewritten by the computer in which it’s installed, but it has the advantage of being very _____.
    6·1 answer
  • Help pls Do you think the current video game industry is likely to experience another ""crash"" (similar to the one in the 1980s
    13·1 answer
  • Which kinds of Internet content do you think you need permission to use? Check all that apply.
    8·2 answers
  • Which of the following is NOT contained on the Slide Show toolbar?
    11·2 answers
  • Open IDLE. Create a new script file (File--&gt;New File, Ctrl n on Windows, Cmd n on macOS). On the first line, place your name
    6·1 answer
  • Helllllllllppppppppppp
    9·1 answer
  • Without net neutrality, which of these situations might occur? (Select all that apply.) a cable company might charge different b
    5·1 answer
  • I need help with computer science<br> the quiz on e2020 is on hackers and unauthorized access
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!