1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goshia [24]
3 years ago
6

Look at the following assignment statements: food1 = "water" food2 = "melon" What is the correct way to concatenate the strings?

50 points
Computers and Technology
1 answer:
Ilia_Sergeevich [38]3 years ago
5 0

Programming language in R studio or R, food1 = "Water" food2 = "Melon"

Concatenate = paste("food1","food2"), will give  "Water Melon". In excel Water in range("B2"), Melon in range("B3"), use =CONCATENATE(B2, " ", C2) it gives Water Melon.

Explanation:

  • R studio is analytical tool which comes from programming S language.
  • We need 3 variable Food1,Food2 and Concatenate in R studio.
  • Food1 = "Water" inverted commas mean it is character.
  • Food2 = "Melon" inverted commas mean it is a character.
  • "=" gives a variable notification.
  • Concatenate is a variable which we use function paste .
  • Concatenate = paste(food1,food2) result "water melon"
  • paste(..., sep = "" , collapse = Null)
  • It is function from R.
  • Excel Water in B2 and Melon in C2 use the formula concatenate.
  • =CONCATENATE(B2, " ",C2) in between commas means space.
You might be interested in
What is the output of a hash function called?
ruslelena [56]

Answer:

cryptographic hash collision.

Explanation:

4 0
3 years ago
Provide a brief, high-level description of how the Internet’s connection-oriented service provides reliable transport.
mario62 [17]

Answer:

  Connection-oriented is the method which is implemented in the transport and data link layer. It is basically depend upon the physical connection in the network system.

Transmission control protocol (TCP) is the connection oriented and user datagram protocol (UDP) is the connection less network transport layer. The TCP and UDP both are operate in the internet protocol (IP).

It basically require connection and it can be establish before sending data. This is also known as reliable network connection service. The connection oriented service establish connection between the different connection terminal before sending any data or information. It can easily handle traffic efficiently.

7 0
3 years ago
When editing the master slides, if you edit the layout on the title page, those changes appear on:
Fed [463]

D. only the first title slide in the presentation.

4 0
3 years ago
Read 2 more answers
Defining a hexadecimal number as in Problem 67, write the function int hexToDec( const int hexNum[]) to convert a four-digit hex
lyudmila [28]

Answer:

#include <stdio.h>

int hexToDec(const int hexNum[]){

   int result = 0, prod = 1;

   for(int i = 3;i>=0;i-=1){

       result += (prod*hexNum[i]);

       prod = prod * 16;

   }

   return result;

}

int main()

{

   int hexNum[4], i;

   char s[5], ch;

   printf("Enter hexa decimal value: ");

   scanf("%s",s);

   

   for(i = 0;i<4;i++){

       ch = s[i];

       if(ch>='0' && ch<='9'){

         hexNum[i] = ch-'0';

      }

      else if((ch>='a' && ch<='f') || (ch>='A' && ch<='F')){

         if(ch=='A' || ch=='a'){

            hexNum[i] = 10;

         }

         else if(ch=='B' || ch=='b'){

            hexNum[i] = 11;

         }

         else if(ch=='C' || ch=='c'){

            hexNum[i] = 12;

         }

         else if(ch=='D' || ch=='d'){

            hexNum[i] = 13;

         }

         else if(ch=='E' || ch=='e'){

            hexNum[i] = 14;

         }

         else{

            hexNum[i] = 15;

         }

      }

   }

   

   printf("%d",hexToDec(hexNum));

   return 0;

}

Explanation:

3 0
3 years ago
What are the uses of navigation keys​
Zolol [24]
The navigation keys allow you to move the cursor, move around in documents and webpages, and edit text.
3 0
2 years ago
Other questions:
  • Why might people feel differently about their digital lives?
    11·1 answer
  • If you are unsure about what is or isn’t appropriate to wear to a new job, what is the best thing to do?
    13·2 answers
  • You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what
    8·1 answer
  • Jody should select the
    5·1 answer
  • Windows organises information on computer using a
    5·2 answers
  • What are the benefits of using an ordered list vs. an unordered list? What are the costs?
    10·1 answer
  • What is the smartest person ever
    15·2 answers
  • 12.
    10·1 answer
  • Direction: using the data at the left, answer the questions that follows.​
    11·1 answer
  • MyProgramming Lab
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!