1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
3241004551 [841]
2 years ago
9

Write an expression whose value is the concatenation of the three strigs name1, name2, and name3, separated by commas

Computers and Technology
1 answer:
krek1111 [17]2 years ago
3 0

Answer:

name1+","+name2+","+name3

Explanation:

Given

name1, name2 and name3

Required

Concatenate, separated by comma (,)

To concatenate, we simply use the + operator.

So, the expression is:

name1+","+name2+","+name3

You might be interested in
) Briefly describe the purpose of the DASH protocol in streaming videos.
Dennis_Churaev [7]

Answer:

The purpose of the DASH protocol in the streaming videos are that it provide the high quality for the streaming media content from the HTTP servers.

DASH stands for the dynamic streaming over HTTP and it is a standard for the steaming over the HTTP that has potential for replacing the various technology. It is basically produces various on demand resources file depending upon the processing power and the bandwidth of the delivery to the clients.

3 0
3 years ago
Which career qualification is unique to the Energy Transmission career pathway and not to the Energy Distribution pathway? color
Sergeeva-Olga [200]

Answer:

a, c, d

Explanation:

6 0
3 years ago
Read 2 more answers
Which best explains a password attached to a document?
Otrada [13]
That is encryption. Encrypted files usually have a password assigned. In order to decrypt the file, you need to have the password.
3 0
3 years ago
The U.S. National Institute of Standards and Technology defines the incident response life cycle as having four main processes:
GuDViN [60]

Answer:

C. Post-incident activity.

Explanation:

An incident is a event of intrusion or attack or violation of an attempt of an attack. An incident response is an opposing response to an attack or violation.

An incident response life cycle are stages followed to mitigate a current attack or violation. The stages of the incident response life cycle are, preparation, detection and analysis, containing and eradicating and recovery, and post incident activity.

7 0
3 years ago
The information of an management information system comes from?
Debora [2.8K]

A management information system is a computer system consisting of hardware and software that serves as the backbone of an organization's operations

5 0
2 years ago
Other questions:
  • 1. Create a detail report that will display all SCR courses in alphabetical order, with the course name and the instructor name
    6·1 answer
  • The radix sort
    14·1 answer
  • Elwin Osbourne, CIO at GFS, Inc., is studying employee use of GFS e-mail for non-business communications. He plans to use a 98%
    6·1 answer
  • After reading the article, "The Impact of Technology", answer the following question.
    7·1 answer
  • If you ping a device, you are using the __________ protocol.
    7·2 answers
  • Technical colleges offer certification in audio engineering through programs that are normally from 2 to 6 months long.
    6·1 answer
  • Write down the bit pattern in the fraction of value 1/3 assuming a floating point format that uses Binary Coded Decimal (base 10
    10·1 answer
  • What are the OSHA construction standards also called ?
    10·1 answer
  • The following statement calls a function named half, which returns a value that is half
    8·1 answer
  • Is Invader Zim gonna come back?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!