1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
max2010maxim [7]
3 years ago
15

Which of the following is true about strings?

Computers and Technology
1 answer:
pickupchik [31]3 years ago
5 0

Answer:

Your answer is option C, or the third option.

They do not let the user type in letters, numbers, and words.

Explanation:

Strings are defined as a sequence of characters literal, constant, or variable. These sequences are like an array of data or list of code that represents a structure. Formally in a language, this includes a finite(limited) set of symbols derived from an alphabet. These characters are generallu given a maximum of one byte of data each character. In longer languages like japanese, chinese, or korean, they exceed the 256 character limit of an 8 bit byte per character encoding because of the complexity of the logogram(character representing a morpheme((which is the simpliest morphological(form or structure) unit of language with meaning)) character with 8 bit (1 byte, these are units of data) refers to cpu(central processing unit) which is the main part of a computer that processes instructions, and sends signals.

You might be interested in
Give examples of an outdated memory or storage device. what do you think is the main reason they are outdated?
omeli [17]

Answer:

floppy discs:

easily damaged, large compared to newer external storage drives, newer computers don't have a floppy disc drive

Explanation:

8 0
2 years ago
Read 2 more answers
Spam and i report
defon

Answer:

option d is the correct answer

8 0
3 years ago
Read 2 more answers
What is a high level language?​
vovikov84 [41]

Answer:

a high level language is any programming language that enables development of a program in a much more user friendly programming context and is generally independent of the computers hardware architecture.

8 0
3 years ago
Read 2 more answers
Explain 2 ways in which data can be protected in a home computer??
Nonamiya [84]

Answer:

The cloud provides a viable backup option. ...

Anti-malware protection is a must. ...

Make your old computers' hard drives unreadable. ...

Install operating system updates. ...

3 0
3 years ago
A smart refrigerator can use what to detect when you are running low on milk, and then send a reminder to you on a wireless
yulyashka [42]

Answer:

Internet of things

Explanation:

Smart refrigerators are equipped with IoTs which helps to sense when one is running low on milk and sends a reminder through a wireless connection.

Internet of things is connectivity or network of things.

  • It involves connection of different computing everyday devices which are able to interact with one another.
  • They have found a wide range of application in our hospitals, homes, and even work places.
  • The connectivity allows for more flexible controls and interaction wherever one might be with different components.
  • It uses a network of objects that exchanges data intermittently.
7 0
3 years ago
Other questions:
  • If a user’s current directory is /home/mary/project1, which command could she use to move to the etc directory directly under th
    5·1 answer
  • All java classes must contain a main method which is the first method executed when the java class is called upon.
    10·1 answer
  • Which is the MOST efficient means of disentangling passengers from a wrecked​ vehicle? A. Remove the steering wheel and column.
    10·1 answer
  • You decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why
    11·1 answer
  • Write a loop that sets each array element to the sum of itself and the next element, except for the last element which stays the
    15·1 answer
  • What is text formatting/
    5·1 answer
  • Star and peer-to-peer are types of
    9·2 answers
  • I live in Pennsylvania which observes eastern standard time.
    13·1 answer
  • In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
    11·1 answer
  • PLZ PLZ PLZ PLZ HELP I ONLY HAVE 5 MINUTES IT SAYS THE SUBJECT IS COMPUTERS AND TECHNOLOGY BUT ITS ACTUALLY MEDIA LIT
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!