1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
2 years ago
14

What is 1 of the rules for naming variables?

Computers and Technology
1 answer:
vova2212 [387]2 years ago
3 0

Answer:

<h3>Rules for Naming Variables</h3><h3>The first character must be a letter or an underscore (_). You can't use a number as the first character. The rest of the variable name can include any letter, any number, or the underscore. You can't use any other characters, including spaces, symbols, and punctuation marks.</h3>

<em><u>#</u></em><em><u>M</u></em><em><u>a</u></em><em><u>r</u></em><em><u>k</u></em><em><u>a</u></em><em><u>s</u></em><em><u>b</u></em><em><u>r</u></em><em><u>a</u></em><em><u>i</u></em><em><u>n</u></em><em><u>l</u></em><em><u>e</u></em><em><u>s</u></em><em><u>s</u></em><em><u>p</u></em><em><u>l</u></em><em><u>e</u></em><em><u>a</u></em><em><u>s</u></em><em><u>e</u></em><em><u>✅</u></em>

You might be interested in
What is the output?
Vinvika [58]

Answer:

20

Explanation:

4 0
3 years ago
Damion recently did an update to his computer and added a new video card. After the update, Damion decided that he would like to
postnew [5]
The answer is Secure boot
3 0
2 years ago
Where does most of the work in creating a presentation will take place? Either formatting toolbar, normal (Slide) view, slide so
LUCKY_DIMON [66]
The normal (slide) view 
8 0
3 years ago
Read 2 more answers
What does CPU stand for
nata0808 [166]

Answer:

Central Processing Unit

Explanation:

Principle part of any digital computer system

6 0
2 years ago
All organizations need good quality cybersecurity to ensure _____. Select 4 options.
vova2212 [387]

Answer:

option 1

Explanation:

it is because they need better security for operational

7 0
2 years ago
Read 2 more answers
Other questions:
  • As it relates to confidentiality, data may be classified in three ways. Match each data classification below to its definition.
    9·1 answer
  • A network administrator issues the show vlan brief command while troubleshooting a user support ticket. What output will be disp
    15·2 answers
  • Which of the following could not be represented by columns in the SPSS data editor? a. Levels of between-group variables. b. Lev
    11·2 answers
  • In 1988, Robert Morris, Jr. launched a program called the _________ that used weaknesses in e-mail programs and operating system
    5·1 answer
  • Does white space have visual weight? Yes or No
    7·2 answers
  • Whois the person start programming​
    13·1 answer
  • Give four advantages for ssd compared to hdd
    15·2 answers
  • What is Microsoft marketing ?
    10·1 answer
  • In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption al
    14·1 answer
  • Var words = ["apple", "bug","car", "dream", "ear", "food"]
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!