1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cupoosta [38]
3 years ago
9

Question #1

Computers and Technology
2 answers:
daser333 [38]3 years ago
5 0

Answer:

int

Explanation:

Here is the input:

"Enter a guess: 2"

The input is the number. The type of variable for whole number (number without a decimal point) is integer, or int in short form.

If the input would be:

"Enter a guess: Hello"

Then the type of variable would be string, because it's a text input.

And if the input would be:

"Enter a guess: 1.5"

Then the type of variable would be float, because it's a number with a decimal place.

Jobisdone [24]3 years ago
4 0

Answer:

What data type is the variable guess?

STRING

Explanation:

<em>Edge2020</em>

You might be interested in
Which statement best justifies the use of a high-speed cache in a CPU?
crimeas [40]

Cache memory is a high-speed memory that stores the instructions and data that have been frequently accessed.  It decreases the time it takes to decode the instructions stored in the instruction pipeline.

A.  It decreases the time it takes to decode instructions stored in the instruction pipeline.

<u>Explanation:</u>

Whenever an instruction is invoked or some data is accessed, the CPU looks for it in the cache memory before accessing the main memory.

If the content is found in the cache memory, it accessed from there and then and hence the access time and decode time is reduced as there were no main memory lockups.

6 0
4 years ago
A virus is a self-replicating program that produces its own code by attaching copies of it into other executable codes.
Allisa [31]

Answer: Stealth/Tunneling Virus

Explanation: Stealth or tunneling virus are the virus which are responsible for attacking a computer system which causes the problem in the functioning of the operating system by manipulating files, creating partition etc.

These viruses try to avoid or prevent the anti-virus scans for the detection any sort of virus or error . They act to prevent any malfunction detection by taking charge for the anti-virus operation.

5 0
3 years ago
What are the main advantages of a solid-state drive (SSD) over a conventional hard disk drive (HDD)? (Choose three)
Masja [62]

Answer:

The benefits of SSDs over HDDs include:

Faster read/write speeds. SSDs can access large files quickly.

Quicker boot times and better performance. Because the drive does not need to spin up as an HDD would, it is more responsive and provides better load performance.

Durability. ...

Power consumption. ...

Quieter. ...

Size.

Explanation:

4 0
3 years ago
Emerson needs to tell his browser how to display a web page. Which tool will he use?
alina1380 [7]

Answer:

HTML

Explanation:

HTML stands for <em>"Hypertext Markup Language." </em>It allows the creation of electronic documents which use <em>semantics</em> to indicate a particular text. The different HTML elements are being separated by<em> "angle brackets" </em>in order to make up a tag. These tags are not visible, but they make it possible for the browser's page to be interpreted.

8 0
3 years ago
Read 2 more answers
As it relates to confidentiality, data may be classified in three ways. Match each data classification below to its definition.
Delicious77 [7]

Answer:

 According to the confidentiality, the data are classified into the three ways that is confidential, public and controlled and it the data classification are matched according to to its particular definition are as follows:

Confidential  = (C) Cannot be released without owner's consent.

Public = (A) Accessible to everyone

Controlled = (B) Not public but can be released without owner's consent

 The confidentiality of the data is basically known as protecting the data from the unauthorized and unlawful access. The data confidentiality is the set of the rules which limit the unauthorized access to the confidential information and it is only available to the authorized people with the reliable access to the data.

5 0
3 years ago
Other questions:
  • You are looking for a backup that copies only the files that have changes since the last full backup. Which of the following wil
    13·1 answer
  • Given that Marcy worked 42 hours (Hours = 42) last week and earns $10.00 an hour (Rate = 10), how much did Marcy earn last week,
    12·1 answer
  • Write the definition of a method named add that receives a reference to a Scanner object associated with a stream of input consi
    13·1 answer
  • How many bits per pixel does a black and white image require?
    15·1 answer
  • Code the function definition for aNonclassFunction, picking up co. aNonclassFunction has no return value.
    8·1 answer
  • The Nigerian 4-6-9 scam refers to a fraudulent activity whereby individuals claiming to be from a foreign country will promise a
    11·1 answer
  • Match the component to its function. resistor inductor capacitor battery transistor This component stores a temporary charge. ar
    7·2 answers
  • The older computer had a CPU that ran at 266MHz compared to a current CPU that runs 3.7GHz. How many times faster is the new CPU
    7·1 answer
  • Un polímero sintético es renovable o no renovable
    11·1 answer
  • Which structural semantic will this HTML code snippet form?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!