1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
3 years ago
5

Which statement is true? Group of answer choices Variables cannot be assigned and declared in the same statement Variable names

must contain at least one dollar sign Variable names can be no more than 8 characters long It is incorrect to initialize a string variable with a number
Computers and Technology
1 answer:
mote1985 [20]3 years ago
3 0

Complete Question:

Which statement is true? Group of answer choices

A. Variables cannot be assigned and declared in the same statement

B.  Variable names must contain at least one dollar sign

C. Variable names can be no more than 8 characters long

D.  It is incorrect to initialize a string variable with a number

Answer:

D. It is incorrect to initialize a string variable with a number

Explanation:

  1. Options A-C are not correct
  2. Variables can be declared and assigned values on same statement like this int a =5;
  3. Variable names must not contain the dollar sign as this declaration int num =0; is legal without a dollar sign
  4. Variable names are not restricted to 8 characters long they can be longer
  5. In option D if you declare a variable of a particular type, you must assign a value of that type for example int s ="John" is wrong
You might be interested in
If anyone did 3-d computer modeling can you answer these short questions mark Brainly really need help
Artemon [7]

Answer:

Answers all of them? or a certain one

4 0
4 years ago
How ICT has helped education to grow through progression?
Vsevolod [243]

Answer:

Hey there!

Explanation:

This is ur answer...

<em>ICTs can enhance the quality of education in several ways: by increasing learner motivation and engagement, by facilitating the acquisition of basic skills, and by enhancing teacher training. ICTs are also transformational tools which, when used appropriately, can promote the shift to a learner-centered </em><em>environment.</em>

Hope it helps!

Brainliest pls!

Have a good day!^^

6 0
2 years ago
Consider the training requirements of a space operations specialist. The first step in the training process is obtaining a gener
Tamiku [17]

Answer:

Command Operations

Explanation:

Space Operation specialist requires special training for aircraft and its operations along with satellite controls. Initially when a graduate joins the training he is required to understand command operations of aircraft. He can then use his skills to learn command operation of spacecraft and then will be promoted to learn satellite controls.

6 0
3 years ago
What are the types of Operating System​
Archy [21]

Answer:

1. Gestión de la memoria principal

Esta es una característica del sistema operativo básica. La memoria principal de la computadora almacena los datos que serán usados por el CPU en la ejecución de los programas. El sistema operativo se encarga de gestionarla, es decir, asignar partes de memoria a la nueva información usada, y evitar que se sature.

2. Gestión de la memoria secundaria

Es la memoria más “permanente” de una computadora. Al igual que la memoria principal, el SO sistema operativo asigna el orden de guardado en esta memoria y la mejor manera de aprovechar el espacio libre.  

3. Gestión de procesos

Cuando envías un comando para que el ordenador realice una tarea, una de las funciones del sistema operativo es organizar los recursos de la computadora para ejecutarla. Esto incluye la memoria, el tiempo del CPU, los programas y archivos necesarios para ejecutar la tarea, los procesos que podrían entorpecerla y los periféricos que podrían ser necesarios para cumplirla.

4. Gestión de recursos  

¡Esta es una de las características del sistema operativo más importantes! El sistema operativo coordina los recursos del hardware que integra la computadora para cumplir con las tareas requeridas. El CPU, los periféricos, las memorias principal y secundaria, los programas, todo tiene que trabajar al unísono para cumplir con las tareas de forma óptima.

5. Gestión de usuarios  

El software operativo controla el acceso de los usuarios a las cuentas individuales o grupales. También, se encarga de administrar a qué recursos e información tiene acceso cada uno de ellos.  

6. Gestión de la seguridad  

Así como controla el acceso de usuarios, el sistema operativo también está encargado de gestionar los controles de seguridad de la computadora, entre ellos el firewall. Por ejemplo, en cuanto a la función del sistema operativo para la seguridad informática es evitar la pérdida de datos, controlar la confidencialidad de los datos y controlar el acceso a la información y a los recursos del equipo.

5 0
3 years ago
Research and discuss the similarities and differences between cloud computing and client-server computing. Discuss the pros and
harkovskaia [24]

Answer:

Cloud computing as a virtual hosting tool, is much more theoretical. Both servers, applications, and communications are hosted in the cloud, off property, rather than being available via computer machine whereas In computing client/server, a controller gets client requests mainframes and needs to share its services, programs and/or data of one sometimes more client systems on the internet, and a client would be a portable platform that specific portions with a server and make use of a finite resource.

Explanation:

<u>Similar to cloud computing and client-server computing: - </u>

  • The cloud computing and client-server networking underpinning principles are the same. That is contact between client and server.
  • Throughout networking and client-server networking, user nodes can communicate (queries) with databases that live locally or are located in many other networks.

<u>Difference between computing and client-server computing: </u><u>- </u>

Resources: -

  • In computing client-server, the corporation or association controls the tools.
  • The services are offered in cloud computing by third parties or other businesses.

<u>The purpose of cloud computing and client-server computing is different:- </u>

  • Client-server computing is targeted at use. In computation, client-server clients request a product from the cloud. The operating system runs the test, then returns it.
  • Cloud computing is a sort of system in which the IT-related services are leased to the clients as a contract.

<u>Pros and cons of Cloud Computing:- </u>

The Pros:-

  • Lower costs for business:-The cloud is saving a lot of money for a medium-sized or small enterprise.
  • Better Reliability:- A dedicated group of experts performs all programming with such a cloud computing alternative.

The Cons:-

  • Limited Control:- When a firm stores cloud data, they have very limited control of it.
  • There have been security issues. The cloud isn't too attuned for every company to position some information on even a cloud.

<u>Pros and cons of client-server computing:- </u>

The Pros:-

  • Improved data sharing:- Data stored via the normal business method and processed on a server is available over an approved connection for the intended users.
  • Security:- Database has stronger access control and methods to ensure data could only be accessed or abused by approved clients.

The Cons:-

  • Overloaded Servers:- When multiple simultaneous requests from the client are made, the server is significantly overloaded, causing congestion in traffic.
  • Impact of centralized architecture:- Because it is centralized if a vital server fails to satisfy customer requests, the client-server then lacks good network robustness.

5 0
4 years ago
Other questions:
  • A(n) _____ is similar to a virus, except that it is an independent program that can be spread across computer networks without b
    11·1 answer
  • A person who wants to buy a compact disc (cd) has just enough money to buy one, and chooses cd a instead of cd
    10·2 answers
  • Which of the following topics is too broad for a 10-minute speech? A. classes offered in interior design B. the history of moder
    13·2 answers
  • What quantities are measured by the following sensors:
    9·1 answer
  • Question 4 of 20
    5·1 answer
  • Online banking tools allow you to pay bills from your computer. <br> a. True<br> b. False
    5·2 answers
  • . An access specifier is one of three keywords:
    14·1 answer
  • All of these acts performed when doing an oil and filter change except ?
    9·2 answers
  • Determine the number of character comparisons made by the brute-force algorithm in searching for the pattern GANDHI in the text
    7·1 answer
  • There are many potential risks associated with the internet. what do we call the distribution and access of illegal copies of di
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!