1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olenka [21]
4 years ago
11

2.8 Code Practice: Question 2

Computers and Technology
1 answer:
love history [14]4 years ago
8 0
We need the question to answer
You might be interested in
PLzzzzzz help me!! I will mark brainiest to the one who answers it right!!
jasenka [17]

Answer: abstract algebra

Explanation: start with the algorithm you are using, and phrase it using words that are easily transcribed into computer instructions.

Indent when you are enclosing instructions within a loop or a conditional clause. ...

Avoid words associated with a certain kind of computer language.

4 0
3 years ago
Class members are accessed via the ____(1)_____ operator in conjunction with the name of an object of the class, or via the ___(
Alborosie

Answer:

1.ClassName and . operator

2. ClassName and [] operator

Explanation:

There are two ways to get the members of a class first one is by using dot(.) operator.

Example : with assumption that person is a class object and age is the member in it we can use it as:

person.age

Second way is to use [] operator with member as a string in it which is used by the compiler as key to get its value.

Example : person["age"]

5 0
4 years ago
Which of the following conditions must be met for a language to be a true programming language?
jarptica [38.1K]
B or A most definitely
3 0
3 years ago
Read 2 more answers
Halp Computer Science
AleksandrR [38]

1st one: is memory

2nd one: is 8

8 0
3 years ago
Read 2 more answers
Which of the following helps create a positive community?
natita [175]

Answer:

Less Violence?

6 0
4 years ago
Other questions:
  • PLEASE HELP
    12·2 answers
  • Who could be involved in the murder of Mr Douglas​
    6·2 answers
  • What is the relevance of Address Block?​
    13·1 answer
  • তথ্য ও যোগাযোগ প্রযুক্তির প্রশ্ন(45)10 সংখ্যাটির সমতুল্য মান?
    14·1 answer
  • Select all the ways in which business professionals might use a spreadsheet in their jobs.
    15·1 answer
  • The Circle and CircleTester have been created, but they have errors. The public and private settings for variables and methods a
    8·1 answer
  • When a virtual machine is
    9·1 answer
  • Question # 2 Multiple Select You wrote a program to compare the portion of drivers who were on the phone. Which statements are t
    6·1 answer
  • Multiple Choice: Circle the letter that corresponds to the correct answer.
    12·1 answer
  • What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!