1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lina2011 [118]
3 years ago
9

A teacher is writing a code segment that will use variables to represent a student's name and whether or not the student is curr

ently absent. Which of the following variables are most appropriate for the code segment? ​
Computers and Technology
1 answer:
SIZIF [17.4K]3 years ago
4 0

Complete Question:

A teacher is writing a code segment that will use variables to represent a student's name and whether or not the student is currently absent. Which of the following variables are most appropriate for the code Segment?

Group of answer choices.

А. A string variable named s and a Boolean variable named a.

B. A string variable named s and a numeric variable named A.

С. A string Variable named studentName and a Boolean variable named isAbsent.

D. A string Variable named studentName and a numeric variable named absences.

Answer:

C. A string variable named studentName and a Boolean variable named isAbsent.

Explanation:

In Computer programming, a variable stores information which is passed from the location of the method call directly to the method that is called by the program.

In this scenario, teacher is writing a code segment that will use variables to represent a student's name and whether or not the student is currently absent.

Hence, the variables which are most appropriate for the code segment are a string variable named studentName and a Boolean variable named isAbsent.

Basically, the string variable named studentName would only accept or hold values that are alphabetic but not numerical value. Thus, the variable studentName would represent the name of a specific student.

Also, the Boolean variable named isAbsent would accept values that are either "True" or "False" because it works on the principle of Boolean logic (0 for false and 1 for true).

You might be interested in
Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets
sashaice [31]

Answer:

The answer is below

Explanation:

Suppose end system A wants to send a large file to end system B, the large file is first divided into smaller chunks. Each chunk is then assigned a header forming a packet. Multiple packets are being generated with each of the packet containing a unique destination address in its header.

When a packet arrives at the packet switch, the switch uses the unique destination address that is attached in the header of the packet to determine the link onto which the packet is to be forwarded.

5 0
3 years ago
18) What is masking in Flash?
sammy [17]

Answer:

Ok thanks, I guess?

..............

6 0
3 years ago
Mr. Green maintains a spreadsheet containing data on all of his employees, including name, job profile, monthly salary, and home
marta [7]
The answer is C because he'll be able to search up the employees name then it will tell him all the information he needs along with their job profile
6 0
4 years ago
What are the classifications of computer
anygoal [31]

Answer:

Computers differ based on their data processing abilities. They are classified according to purpose, data handling and functionality.Computers can be classified, or typed, in many ways. Some common classifications of digital computers are summarized below.

Microcomputers (personal computers).

Minicomputers (midrange computers).

Mainframe computers.

Supercomputers

Microcomputers became the most common type of computer in the late 20th century

8 0
3 years ago
Match each command group under Picture Tools to the appropriate tasks.
FrozenT [24]

Answer:

look at the attachment for correct answers.

6 0
3 years ago
Other questions:
  • Which wireless device connects multiple laptops, tablets, phones, and other mobile devices in a corporate environment?
    13·1 answer
  • A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and stor
    9·1 answer
  • This is an attack that depends on the fact that duplicate values, also called collisions, appear much faster than you would expe
    11·1 answer
  • Which term describes the order of arrangement of files and folders on a computer?
    10·1 answer
  • I really need help with this question
    14·1 answer
  • Which of the following is one of the tools in REPL.it that helps prevent syntax errors?
    10·1 answer
  • Write fade in shorthand​
    11·1 answer
  • H. What is recycle bin?<br>-&gt;​
    10·1 answer
  • Write at least and explain four types of escape sequences and create an example in an IDE which consist of the mentioned escape
    7·1 answer
  • Write a method named removeDuplicates that accepts as a parameter a List of integers, and modifies it by removing any duplicates
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!