1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goshia [24]
3 years ago
6

Look at the following assignment statements: food1 = "water" food2 = "melon" What is the correct way to concatenate the strings?

50 points
Computers and Technology
1 answer:
Ilia_Sergeevich [38]3 years ago
5 0

Programming language in R studio or R, food1 = "Water" food2 = "Melon"

Concatenate = paste("food1","food2"), will give  "Water Melon". In excel Water in range("B2"), Melon in range("B3"), use =CONCATENATE(B2, " ", C2) it gives Water Melon.

Explanation:

  • R studio is analytical tool which comes from programming S language.
  • We need 3 variable Food1,Food2 and Concatenate in R studio.
  • Food1 = "Water" inverted commas mean it is character.
  • Food2 = "Melon" inverted commas mean it is a character.
  • "=" gives a variable notification.
  • Concatenate is a variable which we use function paste .
  • Concatenate = paste(food1,food2) result "water melon"
  • paste(..., sep = "" , collapse = Null)
  • It is function from R.
  • Excel Water in B2 and Melon in C2 use the formula concatenate.
  • =CONCATENATE(B2, " ",C2) in between commas means space.
You might be interested in
Computer Graphics:
algol13
Thanks hope it helps

4 0
2 years ago
How to write a program to draw 1000 random points on a frame in python language for coding?
harina [27]

Answer:

You could generate random numbers between the pixel amount of the height and width than place the dots at those random points

Explanation:

Do you need the code or can you make it using my "headstart"

8 0
3 years ago
Your search google for recipe for tonight dinner is an.example of ?​
Rina8888 [55]

The example is, ethier you need cooking classes or you wish to try something new

Hope the little humor helps

3 0
3 years ago
Read 2 more answers
Of the three different types of résumé formats (chronological, functional, or combination), which format would you use to create
Varvara68 [4.7K]

Of the three types of resume formats (chronological, functional, or combination), I would select the combination format.

Explanation

Choosing the type of Resume depends on what you want your employer to see and the circumstances you are currently in. Some would prefer the chronological Resume because it the most popular Resume used. However, choosing a chronological resume while you are in the process of switching careers or have recently joined the job market is not a good idea. It is specifically meant for those people who have experience. Functional Resume, on the other hand, works well in situations where people have gaps in their work history or looking to switch from one career to the another one.

Combination Resume, in my opinion, stands out as the most preferred Resume to use. It is a combination of chronological and Functional Resumes. A combination Resume;

  • Helps you highlight both your transferable skills and work history
  • It can be used by older workers, those in internship programs, people seeking to switch careers, and experienced workers.
  • It helps showcase your skillset and helps highlight “why you think you are the best fit for the role” question.

Learn more about interview process and Resume structure

brainly.com/question/9018115

#LearnwithBrainly

3 0
3 years ago
Read 2 more answers
If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
ANTONII [103]

Answer:

userB will use his/her private key.

Explanation:

The steps involved in using asymmetric cryptographic algorithm are as follow:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

4. When UserB receives the message, she decrypts it using her private key.

4 0
3 years ago
Other questions:
  • Why is it so important that you know how much traffic dfs replication requires?
    13·2 answers
  • The first computer (the eniac was how big
    8·1 answer
  • If you want to be more efficient at using the World Wide Web, refresh the page often.
    7·1 answer
  • 3. The invention of the transistor was important to the development of computers because it
    5·1 answer
  • Geobubble Chart (2D) displaying Robot Density Per 10,000 Employees for the specified countries;
    7·1 answer
  • In this scenario, hackers launch cyber-attacks that affect several parts of the nationâs financial infrastructure over the cours
    8·1 answer
  • I will mark brainliest
    9·1 answer
  • In the space provided, analyze the pros and cons of becoming a member of an artistic guild. Your answer should be at least 150 w
    12·1 answer
  • Discuss at least 1 Microsoft Windows security features that could protect data?
    5·1 answer
  • Which of the following is not a reason to choose a community college?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!