1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiv31 [10]
3 years ago
8

Define the following BASIC terms: 1. Keywords 2. Constants 3.Variables

Computers and Technology
1 answer:
Mamont248 [21]3 years ago
8 0

Answer:

Explanation:

  1. Keywords: Keywords are those words which have special meanings in QBASIC. Keywords are formed by using characters of QBASIC characters set. Keywords are statements, commands, functions (built in functions) and names of operators. The keywords are also called Reserved Words. Some reserved words are CLS, REM, INPUT, LET, PRINT, FOR, DO, SELECT, ASC, SQR, LEN, and INT.
  2. Constants: They are divided into:
  • Numeric constants: include all numbers (real, integer, not real,...)
  • Character constants: include all character sete (letters, digits, symbols) between two double quotation marks e.g. "BASIC", "the width is 83" etc.

   3. Variables: A variable is a name which can hold or contain a value.

Hope this helps!!

You might be interested in
Explain the difference between true north and magnetic north.
Furkat [3]
Magnetic north is the north a compass points in the direction of. True north, on the other hand, is north based on the earth's axis.
4 0
3 years ago
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
LILLE VIC LUNCUL ANCI.
tatiyna

The correct option is C. toward the floor.

The magnetic force on the moving negative charge acts towards the floor.

<u>Explanation</u>:

The direction of the force applied on the moving charged particle placed in the magnetic field can be determined with the help of Fleming’s Left hand rule.

The current flows in the direction opposite to the direction of electron. If the electron moves from negative terminal to positive terminal, then the current will flow from positive terminal to negative terminal.

As given, the direction of electron- South to North

So the direction of current will be- North to South

Using Fleming's Left hand rule we get the direction of force in downward direction, i.e. towards the floor.

5 0
3 years ago
Question A low level distributed denial of service (DDoS) attack that involves SYN or SYN/ACK flooding describes what type of at
Morgarella [4.7K]

Answer:

TCP SYN flood

Explanation:

TCP SYN flood (a.k.a. SYN flood) is a type of Distributed Denial of Service (DDoS) attack that exploits part of the normal TCP three-way handshake to consume resources on the targeted server and render it unresponsive.

8 0
2 years ago
Match the description to the step in troubleshooting.
Digiron [165]
It should go 4 5 3 2 1
5 0
3 years ago
Other questions:
  • How useful do you find the creation of folders in your computer?
    8·2 answers
  • Which are malicious codes? <br><br> JavaScript <br> Key loggers <br> Scrum <br> Spyware <br> Worms
    12·1 answer
  • The times per second an audio file is converted from analog to digital is the ______. audio file format bandwidth sample rate wa
    5·2 answers
  • The _____ class can be used to get user input using dialog boxes.
    14·1 answer
  • What is one benefit of using electronic sticky notes ?
    9·2 answers
  • The word Only is absolute or qualified
    8·2 answers
  • Fill in the blank; "As well as their traditional role of computing data, computers are also extensively used for..."
    14·1 answer
  • Why was the Internet first developed? Use details and information to explain your answer.
    6·1 answer
  • Im lonnnelllly........................who want to date
    11·1 answer
  • Transition words and phrase in a paragraph
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!