1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiv31 [10]
3 years ago
8

Define the following BASIC terms: 1. Keywords 2. Constants 3.Variables

Computers and Technology
1 answer:
Mamont248 [21]3 years ago
8 0

Answer:

Explanation:

  1. Keywords: Keywords are those words which have special meanings in QBASIC. Keywords are formed by using characters of QBASIC characters set. Keywords are statements, commands, functions (built in functions) and names of operators. The keywords are also called Reserved Words. Some reserved words are CLS, REM, INPUT, LET, PRINT, FOR, DO, SELECT, ASC, SQR, LEN, and INT.
  2. Constants: They are divided into:
  • Numeric constants: include all numbers (real, integer, not real,...)
  • Character constants: include all character sete (letters, digits, symbols) between two double quotation marks e.g. "BASIC", "the width is 83" etc.

   3. Variables: A variable is a name which can hold or contain a value.

Hope this helps!!

You might be interested in
List pros and cons of HCI technology​
Verdich [7]
A pro of HCI technology is that its user friendly and a con about it is that you have to teach the user what to do or guide them!
8 0
3 years ago
Read 2 more answers
Good keyboarding technique includes ________
Svetlanka [38]

Answer:

Keeping you hands on the homerow keys

Explanation:

3 0
2 years ago
Read 2 more answers
What is software piracy
Tju [1.3M]
Software piracy is the illegal copying, distribution, or use of software.
8 0
3 years ago
Read 2 more answers
Which network protocol is used to route IP addresses?<br>A. TCP<br>B. UDP<br>C. IP<br>D. ICMP
ladessa [460]

Answer:

C. IPIP

Explanation:

This protocol is known as an IP that stands for Internet Protocol. This protocol handles the simple task of making sure that the information is routed correctly to and from the corresponding computer machines through the internet. The sending and receiving machines are identified through their Internet Protocol Addresses which lets the protocol know exactly where the information is going and being sent from.

8 0
3 years ago
Which best describes Sayid’s error?
Sonja [21]
<span>Change "move only through matter" to "move through space and matter."</span>
8 0
3 years ago
Other questions:
  • Describe the difference between Global knowledge and personal idea. Why is it important to give credit to others by citing their
    6·1 answer
  • Design and write an object-oriented program for managing inventory bins in a warehouse. To do this you will use two classes: Inv
    5·1 answer
  • Select all examples of proper keyboarding technique.
    15·2 answers
  • Who is the CEO of Quora?
    15·1 answer
  • Which best describes the differences between a resume and a CV?
    13·2 answers
  • A type of multiprocessor chip that provides two or more separate and independent CPUs.
    8·1 answer
  • What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any p
    12·1 answer
  • What invention in the past do you think had a significant impact on our culture/ lifestyle? What do you think will be invented/
    11·1 answer
  • As marketing manager, you need to have ( blank) skills and (blank) skills.
    11·1 answer
  • What is software?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!