1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leva [86]
3 years ago
14

Attribute variables have the same meaning as participants variables. is this true or false?​

Computers and Technology
1 answer:
zysi [14]3 years ago
5 0

Answer:

true

Explanation:

because I said so dude

You might be interested in
What are some of the challenges that could arise from setting up a file management system on a computer?
erastovalidia [21]
One challenge is that arranging things in simple folders creates a limited structure that obstructs the way that would perfectly suit your needs. Any information that is dependent on those folders can easily get lost by removing as much as a simple image from that folder, in the events that the information is dependent on the folder structure.
7 0
3 years ago
AWARDING BRAINLIEST! Hope you are having a great day! Have you seen Shenhe? She's from Genshin Impact, a really cool game! It's
aivan3 [116]

Answer:

I do not play but i would say that the best character would be Diluc

Explanation:

8 0
3 years ago
WRITE IN YOUR OWN WORDS:
MrRa [10]

Answer:

One major sign of a computer being hijacked is the use of system resource by unknown programs. For example, full memory, high cpu usage, slow start up, crashes and errors, and low avalible storage space.

Explanation:

5 0
3 years ago
You used this code to give the user hints.
MakcuM [25]

Answer:

Elif guess < correct

Else

Explanation:

So, you need to insert right condition that compatible with given code, so firstly you need to print that guess was higher  and then if it is not correct and it is not higher  print that it was actually lower.

8 0
3 years ago
What is basic technology​
katovenus [111]

Answer:

<em>Basic </em><em>technology</em><em> </em><em>means </em><em>all </em><em>Technology</em><em> (</em><em>as </em><em>defined</em><em> </em><em>in </em><em>the </em><em>assignment </em><em>Agreement</em><em>)</em><em> </em><em>and </em><em>any </em><em>improvements,</em><em> </em><em>modification</em><em>,</em><em> </em><em>enchantment</em><em> </em><em>and </em><em>derivatives</em><em> </em><em>on </em><em>or </em><em>to </em><em>such </em><em>Technology</em><em> </em><em>that </em><em>are </em><em>developed</em><em> </em><em>after</em><em> </em><em>the </em><em>date </em><em>of </em><em>this </em><em>Agreement</em><em> </em><em>by </em><em>the </em><em>company.</em>

6 0
3 years ago
Other questions:
  • Which one is correct?
    7·2 answers
  • With respect to the five components of social media information systems (SMIS), which of the following statements is true of SM
    11·1 answer
  • Now suppose there are four links between source and destination (three routers in the path between source and destination). Each
    8·1 answer
  • Injection attacks variants can occur whenever one program invokes the services of another program, service, or function and pass
    6·1 answer
  • Can you please help me? I give you a brainlest <br>! ​
    6·1 answer
  • How can one create an online professional network using Face book?
    14·1 answer
  • What can be changed when a style is modified?
    5·2 answers
  • Add the following numbers in abacus 2436+9214​
    8·1 answer
  • Why is my computer fans making weird noises?
    12·2 answers
  • Void printInfo()
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!