1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vampirchik [111]
3 years ago
12

Use the drop-down menus to correctly complete these sentences about common data types.

Computers and Technology
1 answer:
steposvetlana [31]3 years ago
4 0

Answer: Boolean, alphanumeric string, integer, floating-point number

Explanation: cuz I got it right

You might be interested in
5. Question<br> Which one of these can connect directly to the Internet?
I am Lyosha [343]

Answer: Clients

Explanation:

A Client refers to a computer that is able to connect to a server usually in a network in order to access the services provided by that server.

When a user tries to access the internet, the Client accesses the relevant server and requests the information that the user is requesting. The server then sends this to the client which then formats it in the way that the user can understand. The client is thus the direct connection to the internet.

7 0
3 years ago
Maisy is an aspiring video game programmer. She has some unique ideas for new video games, but first, she needs to get some comp
xenn [34]

Answer:

She does not need a computer all she needs are a good laptop that could handle a game engine and a graphic drawing tablet to make the terrain and characters.

Explanation:

It also depends on what kind of game you want to create

6 0
3 years ago
While your hands are on home row, both of your thumbs are on _____. the space bar the return key the mouse B and N
12345 [234]
The space bar is where your thumbs are
6 0
3 years ago
Read 2 more answers
What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view
Lorico [155]

Answer:

Constrained user interfaces is the correct answer to the following question.

Explanation:

Because Constrained user interfaces are the secured function that is used for controlling the access of the user to the computer system and also confines the user to access the data but they can access only that data for which they are not restricted. In other words, Constrained user interfaces is that type of restriction for those users who access your data or resources and they can access only that part of data for which they are allowed.

4 0
3 years ago
Sukant's professor asks her to take over his online class while he is away because she is an effective digital communicator.
Otrada [13]

Answer:

b is the right answer. she posts messages that avoid slang and text language

6 0
2 years ago
Read 2 more answers
Other questions:
  • What were the first microblogs known as
    12·2 answers
  • Write a shell script to count down from two hours to zero seconds using the hour, minute, second display format utilizing the sh
    5·1 answer
  • I need the answer to the below question *ASAP*
    12·2 answers
  • Write a question that the database will understand. Which records are not equal to 5? &lt; 5 &gt; 5 &gt; =5 &lt; &gt; 5
    15·1 answer
  • Select all that apply.
    5·1 answer
  • Multiply each element in origList with the corresponding value in offsetAmount. Print each product followed by a semicolon (no s
    15·1 answer
  • Website managers use____ every day.
    10·2 answers
  • How each programming language differs in terms of constructs, techniques, use and requirements?
    9·1 answer
  • What is the basic body structure of html.
    13·2 answers
  • Post back maintains view state by assigning the form values to a hidden form field named ____.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!