1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scorpion4ik [409]
3 years ago
9

In the following situations, determine a valid identifier following standard naming conventions. For example, the total amount o

f a grocery bill could use the identifier groceryBill.
a variable representing the force applied to a crankshaft
a variable representing the number of images
a class representing delivery trucks
a constant representing the golden ratio
a method reporting annual earnings
Computers and Technology
1 answer:
Assoli18 [71]3 years ago
7 0

Answer:

In the following situations, determine a valid identifier following standard naming conventions. For example, the total amount of a grocery bill could use the identifier groceryBill.

a variable representing the force applied to a crankshaft

a variable representing the number of images

a class representing delivery trucks

a constant representing the golden ratio

a method reporting annual

Explanation:

You might be interested in
Linela Insurance needs to hire twenty accountants immediately to support its accounts receivable process. The hiring and trainin
sukhopar [10]

Answer:

Outsourcing

Explanation:

Outsourcing is a business practice to use third party companies outside business to complete task which were previously done by in-house teams.

Outsourcing is a good cost cutting technique while not compromising very much on the services provided by the business.

There are many pros and cons associated with this technique

Following are some pros

  1. Outsourcing some work increase the efficiency of in house team as they have less work load and they can better focus on their work
  2. Outsourcing work significantly cuts the cost with access to more skilled expertise.
  3. Outsourcing let's you better risk manage. As risk management is shared between both the companies.

Following are some cons

  1. Biggest con of outsourcing is loss of control.When you give your product to a third company to do it for you, you loss control of the product.
  2. With less involvement of the owning business innovation process may see slow growth in out sourced projects
3 0
4 years ago
X = 9 % 2<br><br> if (x == 1):<br>   print ("ONE")<br> else:<br>   print ("TWO")
Alex73 [517]
The output will be : ONE
5 0
3 years ago
Read 2 more answers
Www.microsoft.com is an example of this (two words) (last letter is e) and has to be (10 letters)
a_sh-v [17]

Answer:

domain name (2 words, 10 letters)

6 0
3 years ago
What layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for defining a way to interpret
sweet-ann [11.9K]

Answer:

The data-link layer

Explanation:

The physical layer and data-link layer are often confused a lot especially in terms of what they do in the TCP/IP 7 layer protocol. The physical layer as the name suggests represents the physical devices like the cables and the connectors that join or interconnect computers together. This layer is also responsible for sending the signals over to other connections of a network. The data-link, on the other hand, translates and interprets these sent binary signals so that network devices can communicate. This layer is responsible in adding mac addresses to data packets and encapsulating these packets into frames before being placed on the media for transmission. Since it resides in between the network layer and the physical layer, it connects the upper layers of the TCP/IP model to the physical layer.

3 0
4 years ago
An empty frame used to reserve space for a picture to be inserted at a later time is known as a _____. shape image picture place
Alenkasestr [34]
An empty frame used to reserve space for a picture to be inserted at a later time is known as a Placeholder
3 0
4 years ago
Other questions:
  • I am having trouble with logic gates(AND NOR,etc)
    8·2 answers
  • Analyze the following network traffic logs depicting communications between Computer1 and Computer2 on opposite sides of a route
    12·1 answer
  • When typing a cell, hitting Tab will bring which result?
    12·1 answer
  • Data owners ensure that only the access that is needed to perform day-to-day operations is granted and that duties are separated
    10·1 answer
  • Summarize the four critical issues for cyber warfare.
    6·1 answer
  • In which step of web design is storyboarding helpful?
    10·1 answer
  • Need answer ASAP
    14·1 answer
  • Match the roles to the task they perform.
    5·1 answer
  • Who is responsible for the actions of autonomous systems? (please help me :C)
    14·2 answers
  • How to write a C++ program that lets the user guess if a randomly generated integer is even or odd then the computer lets them k
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!