1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexdok [17]
3 years ago
11

Accepted identifier for a variable in PHP except:

Computers and Technology
1 answer:
Svetradugi [14.3K]3 years ago
7 0

Answer:

b. & Puihaha

Explanation:

PHP variables are supposed to start with a $ sign.

Other rules followed by PHP variables are:

Starting character in variable name (after $) must be letter or _.

Other characters in variable names can be letters,numbers or _.

a. $_Puihaha

c. $Pui_haha

d. $Puihaha

satisfy these rules.

Whereas , b. & Puihaha does not satisfy as it starts with '&'. Moreover it also contains an invalid space character in the variable.

You might be interested in
Audra recently earned her associate’s degree and is looking for a job. Her resume lists her strengths in a separate section. Som
zhuklara [117]

With Audra’s associate degree and list of qualifications, she will be looking for an entry-level position. The position that would be most suitable for her would be (D) auditing clerk.

She will not quality for an Accountant and Marketing Manager position, which requires a longer amount of experience as well as a higher degree of education, and she is overqualified for the Data Entry position which does not require her level of qualifications.

8 0
3 years ago
Read 2 more answers
In the following four questions, we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the pa
pantera1 [17]

Answer:

1)we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. Initially suppose there is only one link between source and destination. Also suppose that the entire MP3 file is sent as one packet. The TRANSMISSION DELAY is:

3 Seconds

2)

we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. The END TO END DELAY(transmission delay plus propagation delay) is

3.05 seconds

3)

we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. how many bits will the source have transmitted when the first bit arrives at the destination.

500,000 bits

4)

we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. Now suppose there are two links between source and destination, with one router connecting the two links. Each link is 5,000 km long. Again suppose the MP3 file is sent as one packet. Suppose there is no congestion, so that the packet is transmitted onto the second link as soon as the router receives the entire packet. The end-to-end delay is

6.1 seconds

5)

we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. Now suppose that the MP3 file is broken into 3 packets, each of 10 Mbits. Ignore headers that may be added to these packets. Also ignore router processing delays. Assuming store and forward packet switching at the router, the total delay is

4.05 seconds

6)

we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. Now suppose there is only one link between source and destination, and there are 10 TDM channels in the link. The MP3 file is sent over one of the channels. The end-to-end delay is

30.05 seconds

7)

we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. Now suppose there is only one link between source and destination, and there are 10 FDM channels in the link. The MP3 file is sent over one of the channels. The end-to-end delay is

30.05 seconds

6 0
3 years ago
What's the difference between repetition and selection control structure.​
mixer [17]

Answer:

Selection statements test conditions and selectively execute code depending on the outcome of the test condition, whereas repetition statements repeat a set of statements till a test condition is satisfied.

7 0
3 years ago
Read 2 more answers
PLEASE HELP DUE!!!<br> WILL GIVE BRAINLIEST!!<br><br> can someone help me please?
drek231 [11]

Answer:

see below picture

Explanation:

You can work your way through the formula from the inside out, mapping every operation to a gate.

6 0
2 years ago
Authoritarian regimes sometimes limit citizens' access to certain websites, reject the use of certain keywords in search engine
Nostrana [21]

Answer: Censorship.

Censorship is actually practiced not only in authoritarian regimes, but is put to higher levels in countries that are under authoritarian regimes. The best example of this would be North Korea. The North Korean leader Kim Jong-un highly restricts what the people of his country have access to, most especially when it comes to the internet.

7 0
3 years ago
Other questions:
  • Match each storyboarding technique with its appropriate description
    9·1 answer
  • Which biometric technique is considered nearly infallible from a scientific point of view and is increasingly preferred by crimi
    8·1 answer
  • Which of these statements describes the difference between binary and decimal numbers?
    11·2 answers
  • The purchase of one cup of coffee a day what's going to do
    15·2 answers
  • Explain how technology is related to human needs and wants?
    13·1 answer
  • Match the desired outcome to the appropriate action.
    6·1 answer
  • Guys im getting the ps5 tomorrow :)​
    5·2 answers
  • Computer Hardware can consist of a
    13·1 answer
  • What is a program that includes a function parameter capable of doing?
    8·1 answer
  • Greenpeace used "Mister Splashy Pants" to:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!