1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zina [86]
3 years ago
14

___________ are the constant values that are used in a program. ​

Computers and Technology
1 answer:
77julia77 [94]3 years ago
3 0

Answer: Data

Explanation:

You might be interested in
HURRY HELP THIS IS FOR CODING !!!! What are some real-life situations that require a program that is iterative? Include at least
Degger [83]

Answer:

A health service, a sales service, a social network, all because they require you to make a request to return a result

5 0
3 years ago
Read 2 more answers
In a proper webpage, which tag holds all of a webpages visible HTML?
Evgen [1.6K]

Body.


head contains all of the data that we generally don't see.


Link is used to link to external stylesheets.


script is where you would type scrips.


doctype is used to tell the browser the document type.

6 0
3 years ago
Which command is used to encrypt all passwords in a router configuration file?
Veseljchak [2.6K]

Answer:

Service Password encryption

Explanation:

It is noted that the command used on routers, to get the data of all the passwords in a router configuration file encrypted is the service password encryption.

Service password encryption solely affects plain text passwords types that includes that of the line passwords or that of the enable password. The feature uses a simple substitution method to create a "secure" non-text password displayed in the configuration.

8 0
3 years ago
Which of these statements describes the difference between binary and decimal numbers?
ElenaW [278]

Answer:

A

Binary numbers use only the digits 0 and 1; decimal numbers use 0 through 9.

Explanation:

Binary means in couples of two. So you count using 0s and 1s like 01, 10, 11, 100, 101, 110, 111, and so on.

7 0
3 years ago
Read 2 more answers
In a bluesnooping attack, the attacker copies emails, calendars, contact lists, cell phone pictures, or videos by connecting to
Kay [80]
The answer is depends. You can only get what the port lets you get. If the phone bans sending photos over Bluetooth than you can’t get the photos
3 0
3 years ago
Other questions:
  • Which one of the following analog VOM ranges would be selected to measure a DC current of 90 milliamps? A. 10mA B. 1.0A C. 10A D
    14·2 answers
  • What can you say about the following Java class definition?
    10·1 answer
  • Peripheral are used to
    6·1 answer
  • Excel can display characters in only three font colors: black, red, and blue. (points : 2) true false
    11·1 answer
  • Sally is editing her science report about living things. She needs to copy a paragraph from her original report.
    13·1 answer
  • What is processing requirement in computer?
    11·1 answer
  • How do I change my name on my Brainly Profile?
    15·2 answers
  • List three social implications of the wider range of piracy​
    15·1 answer
  • Mary and Billy are moving away to college and both know in their hearts that they need to end their relationship. They move away
    5·1 answer
  • A student who wants to work with computers but does not have a strong aptitude for math might find a good fit by pursuing a(n)__
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!