1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
11

Power point programm​

Computers and Technology
1 answer:
viva [34]3 years ago
6 0
Huhhhhhhhyyyyhheyeydud
You might be interested in
In this exercise, first run the code as it is given to see the intended output. Then trace through each of the 3 variables to se
dlinn [17]

Answer:

The memory with variable names str1, str2, and str3 all have equal and the same value after the first if-statement.

Explanation:

The str1 was first assigned a null value while the str2 and str3 were assigned the string value "Karen" with the String class and directly respectively. On the first if-statement, the condition checks if the str1 is null and assigns the value of the variable str2 to str1, then the other conditional statement compares the values of all the string variables.

3 0
3 years ago
Discuss different types of data?[At the language of computer information and technology system]
Artist 52 [7]

Answer:

n computer science and computer programming, a data type or simply type is an attribute of data which tells the compiler or interpreter how the programmer intends to use the data. Most programming languages support basic data types of integernumbers (of varying sizes), floating-point numbers (which approximate real numbers), characters and Booleans. A data type constrains the values that an expression, such as a variable or a function, might take. This data type defines the operations that can be done on the data, the meaning of the data, and the way values of that type can be stored. A data type provides a set of values from which an expression(i.e. variable, function, etc.) may take its values.[1][2]

8 0
3 years ago
Matt goes to an Internet café and tries to access his emails. The email client asks Matt to enter his email address along with t
Radda [10]

Answer:

acknowledging

Explanation:

it has to be d

6 0
3 years ago
Content from online educational tools that is not protected under FERPA includes:
Dmitry [639]

Answer:

b. Any metadata that an online tool produces (for example, data about a student’s usage of a tool, or how much time it took them to take an assessment or look at a video) is not protected if it is not tied to any identifying information.

Explanation:

The content form educational tools that are online that is not protected under FERPA(Family Education Rights and Privacy Act) is any metadata that is produced by the online tool.That metadata can contain data about student's usage of a tool etc.

FERPA governs the access educational information and records by public entities.

4 0
3 years ago
Overview In this project you need to design and implement an Emergency Room Patients Healthcare Management System (ERPHMS) that
notka56 [123]

Answer:

Overview In this project you need to design and implement an Emergency Room Patients Healthcare Management System (ERPHMS) that uses stacks, queues, linked lists, and binary search tree ( in addition you can use all what you need from what you have learned in this course ) The system should be able to keep the patient’s records, visits, turns, diagnostics, treatments, observations, Physicians records, etc. It should allow you to

Explanation:

3 0
2 years ago
Other questions:
  • Help please brainliest
    8·1 answer
  • Rows within a spreadsheet are identified by:
    8·1 answer
  • What natural resource are available on the coast but not somewhereelse
    13·1 answer
  • What is the difference between an electronic notebook and electronic flash cards?
    8·1 answer
  • Who was the creator of the game Fnaf?
    11·2 answers
  • Explain in details how Galen , a physician during the Middle Ages, expanded on Hippocrates' theory of the four humors and explai
    6·1 answer
  • Which feature allows you to copy attributes of
    11·1 answer
  • The transmission control protocol (TCP) layer helps computers to communicate in which of the following ways?
    10·1 answer
  • What form of contacts can be shared in Outlook 2016?
    9·2 answers
  • Compare the freedom available to the American media with the freedom available to media in other parts of the world. How does a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!