1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
2 years ago
5

What can be the maximum possible length of an identifier 3163 79 can be of any length​

Computers and Technology
1 answer:
yawa3891 [41]2 years ago
3 0

Answer:

79 characters

Explanation:

The programming language is not stated, but a little search online shows the question is about python programming language

Literally, identifiers are the names given to variables, arrays and functions.

In most programming languages (e.g. python), identifiers are case-sensitive.

i.e. Abc is a different identifier when compared to abc.

Having said that, python allows up to 79 characters to name an identifier.

Meaning that, the length of a variable name (or array, or function, etc.) can be up to 79 characters, and it cannot exceed 79 characters.

You might be interested in
The main activity area or the brain of the computer is called the ________
Darya [45]

Motherboard

Its a computer chip



6 0
2 years ago
Develop Swimlane Activity diagram for Assignment announcement and submission system.
ArbitrLikvidat [17]
  • Using cases can be visualized in greater detail in this report of an activity diagram.
  • In other words, it's a behavioral diagram that regulates the number of actions via systems. They can also be used to show sequences of activities in business operations.
  • UML Activity Diagrams A business process can be examined to determine its flow and demands that use these tools.

The steps to this question can be defined as follows:

For step 1:

  • The task is to decide the action steps depending upon your use case.

For step 2: Identify all parties involved

  • If you know whoever the actors are, it's easier to determine the acts they are liable for.

For step 3: Establish a movement among activities

  • Change the priority in which the action is required by studying the flowchart.
  • If you need to add any branches to the graph, note the conditions that must be met for certain processes to take place.
  • Furthermore, do you even have to finish some tasks before moving onto someone else?

For step 4: Adding swimlanes

  • We know who is to blame for each act. It's time to assign everyone a swimming lane and group every action they are accountable for under it.
  • Some many activities and actions make up your sales system or process.

Please find the diagram in the attachment file.

Learn more:

Assignment submission: brainly.com/question/11714037

8 0
3 years ago
If your computer freezes on a regular basis and you checked your hard drive and you have insufficient space you've not installed
lina2011 [118]

First, check that your drivers are up to date. The lag could be caused by outdated drivers that are essential in running your system smoothly. New updates will fix bugs, known errors and will make programs work better and faster. Next, run your anti-virus software to check if malware, spyware, and adware that could be putting your computer at risk by installing hidden files, downloading stuff from the internet and uploading sensitive information from your computer. These unauthorized activities could be eating up your RAM in the background without you knowing and thus making your computer run slowly.

7 0
2 years ago
Read 2 more answers
A(n) ____ is an attack that takes advantage of a system vulnerability.
jarptica [38.1K]
<span>Exploit -</span> An attack that takes advantage of a system vulnerability, often<span> due to a combination of one or more improperly configured services.</span>
8 0
3 years ago
I need help pls, in this code if add row for example :
tankabanditka [31]
I thing is going project experiment everyone make plans and
3 0
3 years ago
Other questions:
  • Can Someone give me a 5 paragraph essay about all of the uses in Microsoft Word.
    9·1 answer
  • In this website/app what are the points for?
    7·1 answer
  • Jill is setting up a presentation and wants to use a built-in equation, such as the area of a triangle. To insert this in her pr
    14·2 answers
  • A Network Attached Storage device is good for _____.
    11·2 answers
  • Is it necessary that every autonomous system use the same intra-AS routing algorithm? Why or why not?
    10·1 answer
  • What is the best way to locate where my C program gets into an infinite loop
    5·1 answer
  • Consider the following code segment.
    12·1 answer
  • When compared to defender and analyzer firms, early adopters of new technologies tend to be?
    13·2 answers
  • Persuasion is when Someone speaks to crowd about love <br>○True<br>○False​
    10·1 answer
  • In what ways are super computer different from mainframe computers.​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!