1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
3 years ago
8

In programming, what is a string?

Computers and Technology
2 answers:
valkas [14]3 years ago
6 0

Answer:

C

Explanation:

vovikov84 [41]3 years ago
3 0

Answer:

B.

Explanation:

A. is not the correct answer because that is called a LAN cable (ethernet)

C. is not correct because it has nothing to do with text messages or printing

D. is called a Bus, and isn't the right answer either

You might be interested in
Which part of the cryosphere comes directly from the atmosphere?
marin [14]
The answer to this question is C.
4 0
3 years ago
Read 2 more answers
BI systems have eliminated a common organizational problem, which is simultaneously having too much data but somehow not enough.
lyudmila [28]

Answer:

True

Explanation:

Most of the organization suffers from InfoObesity, i.e., too much data without the proper holding structure for this.

Business intelligence abbreviated as BI plays a major role in the determining the planning strategies of an organizations and serves multiple purposes which includes measurement of performance towards business objectives, quantitative analysis, data reporting and sharing, etc.

BI systems helps in eliminating InfoObesity, by manging the data and filtration of the data with proper data structure to serve specific purposes.

8 0
3 years ago
Can you prove that the bleu areas are the same please?
Nookie1986 [14]

\huge\color{darkred}{ \tt{NO!!}}

8 0
2 years ago
Read 2 more answers
HELP PLSSSSS!!! I WILL MARK BRAINLIEST FOR THE FIRST AND CORRECT ANSWER!!!
dalvyx [7]
The answer you are looking for would be A. Hardware can be an external tool, where as software is an internal tool. Hope this helped!
6 0
3 years ago
Read 2 more answers
you have been tasked with configuring a digital information station in the office's lobby. guests will be able to use the statio
REY [17]

The most important security consideration for the station is code signing. With code signing, consumers may feel confident about the software they are downloading and can stop worrying about infecting their computer.

With code signing, consumers may feel confident about the software they are downloading and can stop worrying about infecting their computer or mobile device with malware. Code signing has grown in importance for software developers and distributors as more software may be downloaded from the Internet.

Malware can be easily installed on a victim's computer by an attacker who poses as a trustworthy source. As long as users only download software that is regarded as safe by their operating system, code signing ensures that these types of assaults cannot happen.

Nowadays, the Operating System looks for the digital certificate produced through code signing when software is downloaded onto a computer to ensure the security of the software being installed. The user is informed and given the option to stop or continue the installation if no digital certificate is detected.

To know more about code signing click here:

brainly.com/question/28860592

#SPJ4

3 0
1 year ago
Other questions:
  • Describe encryption at gateways in thePresentation layer of the OSI Reference Model
    6·1 answer
  • How do I make Dank memes
    13·2 answers
  • Which data type or collection of data types can SOQL statements populate or evaluate to?
    9·1 answer
  • A Network Attached Storage device is good for _____.
    11·2 answers
  • Which of the following should get a Page Quality (PQ) rating of Low or Lowest?
    5·1 answer
  • Someone help ASAP! Match the type of information system with its description.
    13·2 answers
  • Describe and compare imperative (C), functional (SML) and logic (Prolog) programming paradigms.
    9·1 answer
  • For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f
    9·1 answer
  • Czy FALL GUYS będzie działało szybko na i5 GH8? Na ilu FPS?
    13·1 answer
  • _____ interviews rely on scenarios and reflections to evaluate an applicant’s skill set.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!