1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
13

"Jan23" can be stored using which data type? O an alphanumeric string O a boolean operator o characters floating point numbers​

Computers and Technology
2 answers:
Delvig [45]3 years ago
5 0

Answer:

Alphanumeric string

Explanation:

valina [46]3 years ago
5 0

Answer:

a. an alphanumeric string

Explanation:

got it right on edge

You might be interested in
Prepare a algorithm visualization for the Tower of Hanoi when 4 disks are to be moved from spindle #1 to spindle #3.
Setler [38]

Answer:

follwing is the code for Tower of Hanoi for n disks.

#include <iostream>

using namespace std;

void towofhan(int n,char source,char aux,char dest)//function for tower of hanoi..

{

if(n<0)

return ;

   if(n==1)//base case.

   {

       cout<<"Move disk 1 from "<<source<<" to spindle "<<dest<<endl;

       return;

   }

   towofhan(n-1,source,dest,aux);//recursive call.

   cout<<"move disk "<<n<<" from "<<source<<" to spindle "<<dest<<endl;

   towofhan(n-1,aux,source,dest);//recursive call.

}

int main() {

   int n=4;

   towofhan(n,'1','2','3');//function call.

   return 0;

}

Explanation:

If there is only 1 disk then we have to move the disk from source to destination.

Then after that we will apply recursion to solve the problem.

We have to work on only nth disk else will be done by the recursion.

First call recursion to move n-1 disks from source to auxiliary.

Then move nth disk from source to destination spindle.

Now move n-1 disks that are on the auxiliary spindle to destination spindle.

6 0
3 years ago
For an IP or device that is in the local network, it's a very straight forward cache table lookup for its MAC address. How does
astra-53 [7]
It doesn't really. The address is recognized as off the local network, so at the IP layer the packet is sent to the router, whose address is in the ARP table. As the packet travels to different hops, the MAC address is updated to the next hop.
8 0
4 years ago
What came first, the internet or WIFI?
horsena [70]

Answer: wifi

Explanation:

because you can't have the internet if you don't have wifi to power it up

4 0
3 years ago
How do you return a value from a function?
rjkz [21]

Answer:

return instruction used to return a value from a function.

Explanation:

Function is a block of statement which perform the special task.

Syntax for define a function:

type name(parameter_1, parameter_2,...)

{

  statement;

return variable;

}

In the syntax, type define the return type of the function. It can be int, float, double and also array as well. Function can return the array as well.

return is the instruction which is used to return the value or can use as a termination of function.

For return the value, we can use variable name which store the value or use direct value.

4 0
3 years ago
Which organization issued the Credo for Communication Ethics?
Helen [10]

Answer:

National Communication Association

Explanation:

Credo for Communication Ethics was issued by National Communication Association, which was established by Western Michigan University in 1985. Communication ethics represents the idea that one's moral influences one's behavior, and one's communication too. But, it is not just about individuals: it also deals with groups, great organisations, businesses and professional organisations, i.e. every form of human communication. That includes personal communication, mass media and digital communication.

5 0
3 years ago
Read 2 more answers
Other questions:
  • The set of Visual Basic instructions that tells an object how to behave after an action by the user (such as clicking a button)
    6·1 answer
  • Which of the following refers to special eyeglasses from Google that provide the user with visual information directly in front
    5·1 answer
  • The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .
    13·1 answer
  • Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual. wh
    5·2 answers
  • How do you optimize a website using JavaScript?
    10·1 answer
  • Which of the following statements is false? The ARPANET is the precursor to today’s Internet. Today’s fastest Internet speeds ar
    11·1 answer
  • Describe how operating system use the following security tools: firewall, automatic updating, antivirus software, spyware and ma
    11·1 answer
  • The letters G, H, T, Y, B, and N are what type of keys?
    15·2 answers
  • Give an example of how loops are used in programming Kturtle​
    7·1 answer
  • What's good computing?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!