1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mixer [17]
3 years ago
11

How many types of window in Qbasic​

Computers and Technology
1 answer:
Pachacha [2.7K]3 years ago
7 0

Answer:

The QBasic Editor Screen has three parts. They are- Editor Window, Immediate Window and Output Window.

You might be interested in
Brainless is one the way if you help
V125BC [204]

Answer:

1. x - 6

2. p - ? = 7

i chose these equations because

a number - 6 = the weight of your backpack.

p - an unknown number without a substitute variable = slices of bread left.

3 0
2 years ago
Write an application that prompts a user for a month, day, and year. Display a message that specifies whether the entered date i
gizmo_the_mogwai [7]

Answer:

Following is given the code with all necessary description given as comments in it. I hope it will help you!

Explanation:

4 0
3 years ago
Exchanging which type of data uses the least bandwidth?
Mariulka [41]

Answer:

Voice data uses less bandwidth during exchanging  

Explanation:

The in-network volume of data been transferred between two network points. The data transfer in the network will be heavy and some time it will less.  

It all depends on the end-user data transfers. If end-user transfer media files such as video or bandwidth will be used heavy. If voice data is used then it uses very less.  

Suppose end-user transfer txt file or XML files some it uses very less bandwidth that also depends on file size transfer.

8 0
3 years ago
A metacharacter is a character that has a special meaning assigned to it and is recognized as part of a scripting or programming
nydimaria [60]

Answer:

The answer is "Option a"

Explanation:

Meta-character is a unique character, which is used in the system or information area, that provides information about the other characters. This type of character is used in both command-line and programming.  

  • It has a particular meaning and should be prevented for reasons except for its particular importance.
  • It attempts in the algorithmic technique to view all character as a fundamental ASCII instead of a specific purpose.
3 0
2 years ago
What is three-way handshake? Draw a diagram showing how a TCP connection is established through three-way handshake.
Levart [38]

Explanation:

A three way handshake is a method to create a connection between host and server.It is used in a TCP/IP network.

To establish a connection three steps are followed which are as following:-

  1. The host or sender sends a data packet called SYN to the server or receiver.It's purpose is to as if the receiver is open for new connections.
  2. When the receiver receives the SYN packet it responds with an ACK or SYN/ACK packet as a confirmation for the connection.
  3. When the sender receives the SYN/ACK packet and it respond with ACK packet.

8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the difference between primary storage,secondary storage and offline storage what type of storage can be
    6·2 answers
  • What is the relationship between ionic bonds and cleavage
    13·1 answer
  • What is microsoft access?
    14·1 answer
  • Why would an IT technician ever have to change out a computer’s motherboard?
    5·2 answers
  • To print a mailing label, click the Labels button on the MAILINGS tab in the ____ group. A. Building Block B. AutoText C. Templa
    10·2 answers
  • What is a table in excel
    10·2 answers
  • As it turns out, the scale of this chart is higher than all of these; it’s “exponential.” What does this imply for the difficult
    8·1 answer
  • FILL IN BLANK FOR THE POINTS!!!!!!
    8·1 answer
  • Define each of the following data mining functionalities: characterization, discrimination, association and correlation analysis
    9·1 answer
  • How does a cloud-first strategy differ from other approaches to cloud?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!