1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
4 years ago
8

In programming, what is a string?

Computers and Technology
2 answers:
valkas [14]4 years ago
6 0

Answer:

C

Explanation:

vovikov84 [41]4 years ago
3 0

Answer:

B.

Explanation:

A. is not the correct answer because that is called a LAN cable (ethernet)

C. is not correct because it has nothing to do with text messages or printing

D. is called a Bus, and isn't the right answer either

You might be interested in
(true/false) In a layered operating system design, requests (such user processes may need to interact with multiple layers, resu
Julli [10]

Answer:

The correct answer to this question is "true".

Explanation:

In a layered operating system, all the layers defined individually and communicate with each other when required. It is also easier to create, manage and update the system. If we change in one layer. The Changement has done in only a specific layer it does not affect any other layers. In this operating system, there are 6 layers.

In the monolithic system. It works on the kernel space. That increases the size of the operating system and kernel. It is different than the microkernel system. In the monolithic system, there are 3 layers.

If we assign any work to both, So the 6 layers will take more time to do that work. when that 3 layers take less time to do that work.

that's way layered operating performance is slower than the monolithic system.

6 0
4 years ago
How do i put pics on this app ​
natka813 [3]
It says insert image I think. Or there’s a button that looks like a picture
6 0
3 years ago
What medium allows for electronic delivery of DTP content without the need for any physical media?
Lostsunrise [7]
Email? Dropbox?...Not sure give one of these a try? Hope this helps
0 0
3 years ago
In popular usage and in the media, the term ________ often describes someone who breaks into a computer system without authoriza
ch4aika [34]
The answer here is hacker
6 0
3 years ago
For homework, we were given this photo and to figure out what it is. It is up close and labelled “ too close to tell” but I have
dalvyx [7]
I honestly have no idea on what this is... but im guessing its some sort of tool or food in somebodys mouth... probably isn't but oh well..
7 0
3 years ago
Other questions:
  • What type of organism forms the base of food webs?
    9·1 answer
  • Recursive Power Function Write a function that uses recursion to raise a number to a power. The function should accept two argum
    15·1 answer
  • Differences between Quality of Services and a Service of Quality approach
    9·1 answer
  • What is the difference between a sequential program and an event-driven program?
    9·1 answer
  • How can you know if the person or organization providing the information has the credentials and knowledge to speak on this topi
    13·1 answer
  • 4. You are planning to buy a new couch for your family room. Before you leave for the furniture store, you measure the available
    11·1 answer
  • What are the words that make up a high-level programming language called?
    6·1 answer
  • Which statement correctly differentiates how to use list and table styles?
    12·2 answers
  • Kkkkkkkkkkkkkkkkkk kkkkkkkkkkkkkkkkkkkkkkkkkk
    15·2 answers
  • You hide three worksheets in a workbook and need to unhide them. How can you accomplish this?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!