1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
9

Write an If...Then statement that assigns 0 to intX when intY is equal to 20

Computers and Technology
2 answers:
ICE Princess25 [194]3 years ago
7 0

Answer:

if int Y = 20 Then

           int X = 0

           End If

Explanation:

The Question says, when intY is equal 20

So if intY is not 20, 0 cannot be assigned to intX

and vice versa

BigorU [14]3 years ago
3 0

Answer:

wh,,what?

Explanation:

You might be interested in
What happens when text is added to grouped objects that is larger than an object ?
Elodia [21]

Answer:

You have to select the picture and pick the text at first.

Then press context menu key on a keyboard or right mouse button and choose group/ungroup point.

Choose group.

And finally you can select and resize the object and text simultaneously.

6 0
3 years ago
Read 2 more answers
97. How many bits is a ki obyte?<br> a. 1000<br> b. 1024<br> c. 8192<br> d. 8124<br> 5
Basile [38]

Answer:

b

1024

is the correct answer

6 0
3 years ago
Read 2 more answers
QUESTION: Which is not an example of a video port or cable?
Vikki [24]

Answer:

Radio Corporation of America (RCA)

Explanation:

A corporation is not a video connector.

8 0
3 years ago
What is 1 TB equal to ?<br> . 1024 kb<br> .1024 gb <br>. 1024 pb <br>. 1024 mb​
OLEGan [10]

\large \mathfrak{Answer : }

1 TB = 1024 GB

3 0
3 years ago
Read 2 more answers
What vowel(s)!are Missing in the Word= "a b t" ???
grigory [225]
O AND U which spells ABOUT
5 0
3 years ago
Other questions:
  • While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes
    7·1 answer
  • Worms often try to disguise from where they are sending data by using a bogus ip addresses instead of using an authorized ip add
    11·1 answer
  • Write a function that accepts a list as an argument (assume the list contains integers) and returns the total of the values in t
    10·1 answer
  • In addition to MLA, what are some other widely used style guides? Check all that apply.
    5·1 answer
  • Your Google Search text ad has three main components. The first is a headline, and the second is a description. What's the third
    14·1 answer
  • One side in a Transmission Control Protocol (TCP) connection has not been able to properly recover from a series of malformed se
    6·1 answer
  • Midday is a good time to take a portrait outside.<br> true or false?
    8·1 answer
  • In a typical day, what types of Computer-Mediated Communication do you use?
    8·1 answer
  • Can people survive without technology?
    5·1 answer
  • If you delete search results, you will a. clear the history on the computer. b. delete files from our computer. c. modify the re
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!