1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pochemuha
3 years ago
8

Which of the following does not represent the function of a Variable? Variables store data in memory; this data has limited use

throughout a program.
Variables are used to store information that is referenced and manipulated in a computer program.
Variables provide a way of labeling data with a descriptive name
Variables are containers that hold information.
Computers and Technology
1 answer:
Bond [772]3 years ago
5 0

Answer:

Variables store data in memory; this data has limited use throughout a program.

Explanation:

In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information which can be modified or edited.

Basically, variable stores information which is passed from the location of the method call directly to the method that is called by the program.

Some of the function of a Variable includes;

I. Variables are used to store information that is referenced and manipulated in a computer program.

II. Variables provide a way of labeling data with a descriptive name. This helps to make programming codes to be clear and easy to understand for everyone.

III. Variables are containers that hold information.

Generally, variables are essential in writing codes because they are used to label and logically store data in contiguous memory locations.

<em>Hence, variables store data in memory; this data can be used throughout the program i.e they do not have limited use throughout a program.</em>

You might be interested in
The _____ unit is the preferred style unit for web page text because it makes it easy to develop pages in which different page e
cluponka [151]
Em The answer that you are looking for is (em)
6 0
4 years ago
Read 2 more answers
I have a question about my HP Laptop
vekshin1
What exactly is your question?
7 0
4 years ago
Write a SELECT statement that returns these columns from the Products table: The list_price column The discount_percent column A
Anarel [89]

Answer:

Check the explanation

Explanation:

The SELECT statement that returns these columns are:

SELECT

   list_price,

   discount_percent,

   ROUND (list_price * discount_percent / 100,2)  AS discount_amount

FROM

   products;

----------------------------------------------------------------------

6 0
3 years ago
The U.S. government developed the TEMPEST program to reduce the risk of
Natasha_Volkova [10]
I believe it’s the first one.
8 0
3 years ago
Give two reasons why network security is the most important issue regarding data centers.
deff fn [24]
Three key concepts of security are integrity, confidentiality, and availability.

Network firewalls are the first line of defense, intended to keep intruders out. Once a system is compromised, all of its data can be accessed, and if a bad actor gains access to one system, they effectively have access to all of the systems. This touches on both system integrity and data confidentiality.

Security is also related to availability, or uptime. If your network is compromised, it may be inaccessible to those who need to use it, making it useless. If I'm working from an office in Chicago, and the company's main DC is in Atlanta, I need the network to remain available to access critical files.
7 0
3 years ago
Other questions:
  • Principles of defensive driving include:
    15·1 answer
  • Which are among the ways you can use bitlocker encryption? (choose all that apply?
    5·1 answer
  • Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only
    8·1 answer
  • An Administrator wants to have a thank you email sent after the form on the "Request a Demo" landing page is submitted. Where ca
    12·1 answer
  • Which of the following is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct
    15·1 answer
  • When activated, an Excel object has all the features of an Excel ______?
    9·2 answers
  • How does it transform your ways of socializing
    11·1 answer
  • Which of the following is not an operating system a) boss b) window xp c) linux d) bindux​
    15·1 answer
  • Q1). Write a python program to pass a list to a function and double the odd values and half even values of a list and display li
    12·1 answer
  • Why is computer called information processing machine ?????​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!