1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
3 years ago
15

Variable names may contain spaces and punctuation symbols. True False

Computers and Technology
1 answer:
Vladimir79 [104]3 years ago
4 0

Answer:

False

Explanation:

Programming languages use variables to reserve a space in memory needed to hold the values while the program is executed.

Every language has a set of rules to give names to the variables. Some commonly used conventions are listed below.

1. Variable names cannot contain spaces and punctuation symbols.

Example roll num is an incorrect variable name.

2. Variable names begin with alphabets or letters only.

Example a, sal

3. Variable names cannot begin with numbers or digits.

Example sal2019  

4. Variable names can have underscores only in between.

Example mngr_sal, mngr_bonus

Underscores enable categorizing the variables based on the initial name like above.

5. Keywords cannot be used as names of variables.

Example Integer, String cannot be the name of any variable.

6. Special characters are not allowed in the names of the variables.

The above naming conventions are common across all programming languages. Other rules may be implemented specific to a particular language.

Variables are declared to tell the compiler to reserve a memory space which should be sufficient to hold the variable of this type.

int age;

char reply;

string name;

The above variables are of integer, character and string data type respectively.

Variable initialization assigns a value to the variables.

age = 24;

reply = ‘n’;

name = “Brainly Website”;

The character variable holds 1 letter at a time and is written in single quotes.

The string variable holds a sequence of characters, numbers and spaces and is enclosed in double quotes.

Variable declaration and initialization can be done simultaneously.

String full_name = “Lexi 8791”;

As a practise, variable names are not written in upper case except in case of constants. Constants can have names only in upper case.

An example of constant variable name declaration and initialization is given.

static final int MIN_USERS = 10;

The above information about variables is common across the programming languages.

You might be interested in
An administrator needs to set up an authentication server for users connecting to a network through a VPN. What kind of server c
nalin [4]

Answer:

RADIUS

Explanation:

RADIUS is the networking protocol that is used for the purpose of authentication to access the network resources. The full form of RADIUS is Remote Authentication Dial In User Service. It is used by different organizations, which setup their own network that can be accessible through VPN, DSL or modems through different networks. The purpose of this protocol is to establish the security and authentication mechanism by organization itself.

So, If an administrator needs to set up an authentication server for users connecting to a network through a VPN, he should establsih the RADIUS based Server.

3 0
3 years ago
Which of the following expressions yields an integer between 0 and 100, inclusive? Question 5 options: (int)(Math.random() * 100
Alex17521 [72]

Answer:

(b) (int)(Math.random() * 101)

Explanation:

Given

min = 0 --- minimum

max =100 --- maximum

Required

Java expression to generate random integer between the above interval

The syntax to do this is:

(int)(Math.random((max - min) + 1) + min)

Substitute the values of max and min

(int)(Math.random((100 - 0) + 1) + 0)

Simplify the expression

(int)(Math.random(100 + 1) + 0)

(int)(Math.random(101) + 0)

(int)(Math.random(101))

Hence, the right option is:

(b) (int)(Math.random() * 101)

3 0
3 years ago
Name three actions you should take if you believe you’ve been victimized by crimeware or online fraud
allochka39001 [22]

Try restating system software and delete anything that may have caused the online fraud then remove all credit cards and info on the device. Tell the authorities and get a new device and email with a software protector. When doing this DO NOT DO WHAT YOU ORIGINALLY DID TO GET VICTIMIZED AND (DON'T TRY TO SIGN INTO YOUR PREVIOUS EMAIL ON A NEW DEVICE)  

4 0
3 years ago
Read 2 more answers
The records in a database table are generally visualized as​ ________.
Misha Larkins [42]
<span>The records in a relational database table are generally visualized as fields.
</span>The data in database  is stored in records that contains all the data about one particular item in the database. Each record is composed of fields. <span>The field is a single piece of data such as name, date of birth or telephone number. </span>
T<span>he </span>fields of all records form the columns.
6 0
4 years ago
When federal courts are evaluating digital evidence from computer-generated records, what exception is applied to hearsay?'
Sidana [21]

Answer:

Business-records exception

Explanation:

The Business-records exception which is also known as the Business Entry Rule, this is an exception to the evidentiary rule (which rules out hearsay from a trial) that permits business records to be admitted if the appropriate foundation is laid to show the document is dependable and can be relied upon.

5 0
3 years ago
Other questions:
  • Why do computers need to periodically check the dns for websites you have already visited? enter your answer here?
    15·1 answer
  • Tricia listed her assets and liabilities. Credit Card Bill Car Loan Bonds Piano Bank Account Bicycle Which are Tricia’s liabilit
    8·2 answers
  • All of the following can be caused by the movement of geologic plates EXCEPT
    15·1 answer
  • You buy a new workstation that features an embedded RAID controller on the motherboard. You want to setup hardware RAID 10. How
    10·2 answers
  • How does a search engine use algorithms to provide search results?
    15·2 answers
  • Is there any difference beetween the old version of spyro released on the origional and the newer ones??? or is it only change i
    8·1 answer
  • When do you use an else statement?
    10·1 answer
  • Suppose the cache access time is 10ns, main memory access time is 200ns, and the cache hit rate is 90%. Assuming parallel (overl
    10·1 answer
  • GIF is example of raster image<br><br><br> RIGHT OR WRONG?
    15·1 answer
  • you manage a network that has multiple internal subnets. you connect a workstation to the 192.168.1.0/24 subnet. this workstatio
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!