1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
2 years ago
12

What is the data type of the following expression?

Computers and Technology
2 answers:
SVEN [57.7K]2 years ago
8 0
D Integer

Since 5/1 = 5 that’s no float. Maybe if it was 5/1.0 then it would be 5.0 which is a float. So int is the answer.
fgiga [73]2 years ago
6 0

Answer:

What do u mean by 5/1... And Sry for disturbing

You might be interested in
ANSWER THIS CORRECTLY FOR BRAINLIEST
jeka57 [31]
The answer is https it is on Every url
6 0
3 years ago
Read 2 more answers
The most popular way for hackers to take over hosts today is ________.
asambeis [7]

 The most popular way for hackers to take over hosts today is by taking over an application.

 This is the reason why application security in corporate computer security systems is a very important aspect.

A hacker can log into the machine, download an executable, ran it, cover his/her tracks by deleting the installer, and log off.


8 0
3 years ago
Read 2 more answers
A company has an Aruba solution. The company wants to host a guest login portal with this solution, and the login portal must gi
mariarad [96]

Answer: D. Choose ClearPass or the other external captive portal option for the guest WLAN.

Explanation:

The Aruba Instant On mobile app allows the configuration and monitoring of a network from anywhere. It provides an affordable solution to small businesses and they're reliable and secure.

Based on the criteria given in the question, the network administrator can meet the criteria by choosing a ClearPass or the other external captive portal option for the guest WLAN.

8 0
3 years ago
When is it appropriate to utilize the nat network connection type?
lbvjy [14]
Whenever the VM does not need to be access at a known address by other network nodes.
6 0
2 years ago
What is information technology?
nirvana33 [79]
Information technology is the application of computers to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise. 
7 0
3 years ago
Other questions:
  • In a student​ database, a row that describes the top​ student, including his or her​ lastname, firstname, and​ studentnumber, is
    9·1 answer
  • Which type of system must you connect to and use to make changes to Active Directory?
    15·1 answer
  • Parameter variables should not be changed within the body of a method because _______________. Select one: a. it mixes the conce
    5·1 answer
  • Is Digital technology always better or should we champion or even return to innovative of analog machines and experiences? Apex
    13·1 answer
  • Use this option to view your presentation as your audience will see it. a.File menu b.Play button c.Slide Show button d.Tools me
    6·2 answers
  • By default, a word document generally displays in ____ view.
    9·1 answer
  • Create a structure named planet This structure will contain distance from Earth as an integer Atmosphere, language, people and p
    8·1 answer
  • Which of the following statements about email is true?
    5·1 answer
  • Create an application that determines the final cost of food items and non-food items, assuming only non-food items are taxed. T
    8·1 answer
  • These 2 questions PLEASEEE (:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!