1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
14

What is the use of consonant in QBASIC ? Answer me in short and easy answer.​

Computers and Technology
1 answer:
Digiron [165]3 years ago
3 0

Answer:

See Explanation

Explanation:

I'll assume the question is about the use of constants in QBasic because consonants do not have any special function or usage in QBasic.

In simple terms: In QBasic, constants are used to represent elements that do not change in value during program execution.

Take for instance, you intend to use \pi in your program.

Its value is \pi = 3.142

So, 3.142 will always be a constant in your program. One of the ways it can be used in a program is:

10 LET PI = 3.142

<em>The above represents a numeric constant. QBasic also have string constants.</em>

You might be interested in
What is an activity that can help you enhance the appearance of your computer’s desktop?
aleksandrvk [35]
Depending on your computer, but going to control panel on a Windows computer can change the brightness, and backgrounds. 
5 0
4 years ago
Read 2 more answers
Write an answer in three to five sentences that describes the photo, explains what better lighting would mean for your photograp
miskamm [114]

Lighting is an important aspect in creating a great photograph.

Not only does lighting determine brightness and darkness, but it also influences

  • tone,
  • mood, and
  • atmosphere.

As a result, proper light management and manipulation are required to get the

  • best texture,
  • richness of color, and
  • brightness on your objects.

<h3>What kind of light produces the best photos?</h3>

Because of its mobility, a speedlight or flash is frequently the ideal photographic illumination on-site. Speedlights can handle much of the work of studio strobes when used with an off-camera wireless flash system.

Learn more about lighting in photography:
brainly.com/question/2321244
#SPJ1

3 0
1 year ago
A. experiment by purposely misconfiguring the gateway address on pc-a to 10.0.0.1. what happens when you try and ping from pc-b
MrRa [10]
Yes you will mate, hope this helps!
7 0
3 years ago
A three-tier design includes a middle layer between the client and server that processes the client requests and translates them
devlian [24]

Answer:

a. True

Explanation:

The three tiers in a three-tier architecture are:

Presentation Tier: Occupies the top level and displays information related to services available on a website. This tier communicates with other tiers by sending results to the browser and other tiers in the network.

Middle Tier: Also called the application tier, logic tier, business logic or logic tier, this tier is pulled from the presentation tier. It controls application functionality by performing detailed processing.

Data Tier: Houses database servers where information is stored and retrieved. Data in this tier is kept independent of application servers or business logic.

5 0
3 years ago
In the writing process, after you ve narrowed down your topic, you can use the _______ technique to view a topic from different
Veseljchak [2.6K]
It's a. when you finish your topic you can see topic from <span>different perspectives by questioning. Matching will not allow you that.</span>
8 0
3 years ago
Read 2 more answers
Other questions:
  • The program prompts the user to interactively enter eight batting averages, which the program stores in an array. The program sh
    9·1 answer
  • Information management examines the organizational resource of information and regulates its definitions, uses, value, and distr
    11·1 answer
  • If the pc­doctor software is installed on a computer's hard drive, what two different ways can the program be started?
    7·1 answer
  • ICT excel data homework
    10·1 answer
  • There are a multitude of items that Cyber Security professionals view as attack vectors but none are more prevalent and exploita
    13·1 answer
  • Your organization is planning to deploy wireless access points across their campus network, and you have been tasked with securi
    5·1 answer
  • What is the purpose of a career portfolio?
    6·1 answer
  • An organization is developing an authentication service for use at the entry and exit ports of country borders. The service will
    10·1 answer
  • What do you expect the future trends of an operating system in terms of (a) cost (b) size (c) multitasking (d) portability (e) s
    12·1 answer
  • Code Problem 3 in Python 2.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!