1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dima020 [189]
3 years ago
5

first 2 questions are true or false the last question is multiple choice. 7th grade work. plz only answer if u know.

Computers and Technology
1 answer:
pshichka [43]3 years ago
3 0

#4 is true

We use pseudocode to help us understand code.

#5 is false

Strings are surrounded by quotes, integers are not.

#6 is 100.

Integers are numbers with no decimal places.

You might be interested in
Importance of software in computer​
Ymorist [56]

Explanation:

<h2>Software not only makes your computer hardware perform important tasks, but can also help your business work more efficiently. The right software can even lead to new ways of working. It is therefore a crucial business asset and you should choose your software carefully so that it matches your business needs.</h2>

\huge\bold\red     {Befikra❥☘⍣❦}

4 0
3 years ago
WILL UPVOTE ALL plz
evablogger [386]
Ash is the answer. Hope this helps
4 0
4 years ago
Which of the following is a reason that a drug may not receive FDA approval?
lora16 [44]

Answer:

D

Explanation:

8 0
4 years ago
5. What are some situations where you might find it useful to use the “!” symbol in a program?
svlad2 [7]

Answer:

The most common use of symbols by programmers is for performing language reflection (particularly for callbacks), and most common indirectly is their use to create object linkages. In the most trivial implementation, they have essentially named integers (e.g. the enumerated type in C).
<u>Help Me By Marking Me as Brainlist ...</u>

5 0
2 years ago
Read 2 more answers
What is the most common threat on the internet? auction fraud illegal software computer viruses hackers?
Nimfa-mama [501]
Computer Virus is the most common threat next fraud, hackers
6 0
3 years ago
Other questions:
  • How many bits are in 1 tb? [hint: depending on the tool used to calculate this, you may need to use a trick to get the exact res
    6·1 answer
  • Which Tire would you use to explain a set of phones in an HTML document?
    12·1 answer
  • In this lab you used the sharing and storage management console to create a simple volume. what must you do to create a differen
    13·1 answer
  • Where are all of your documents saved?
    14·2 answers
  • Write a SELECT statement that returns these column names and data from the Order_Items table:
    14·1 answer
  • Assume there is a variable, h that has already been assigned a positive integer value. Write the code necessary to compute the s
    9·1 answer
  • Which of the following is not a responsibility of a member of society?
    14·1 answer
  • RAM that can be changed. True or False
    9·2 answers
  • Why is it important to ensure that DNS Servers have been secured before implementing an e-mail system
    7·1 answer
  • Cisco cyber security would classify this email?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!