1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
3 years ago
15

How do we store value in a variable? Give an example

Computers and Technology
1 answer:
Komok [63]3 years ago
4 0

Answer:

hi

Explanation:

im not smart

You might be interested in
10 POINTS
Sunny_sXe [5.5K]

Answer:

True

Explanation:

They want to focus on their customers and their interests, so they market their products to a specific audience. hope this helps :)

4 0
3 years ago
What would happen if the two pith balls shown in the figure above were held together for a few moments, then released?
Arisa [49]

B. The charge would leak off and the pith balls would hang straight down.

3 0
3 years ago
you work in the Human Resources department of a company that has partnered with a similar company in Brazil on a big contract. y
Phoenix [80]

Answer:

Option C: Organizational Chart.

Explanation:

The main goal, in this case, it's to help the team to know the company and its integrants.

An organizational chart -- also called organigram -- is the best tool to clarify how the Brazilian company works.

The organigram is a diagram that illustrates the structure of an organization, how one part its related to another, and the assigned responsibilities of each specific department. Through this tool, the team will have a clear idea of who their counterparts are and how their job is related to ours.

4 0
3 years ago
The term unauthorized access is a synonym for hacking. <br><br> a. True <br><br> b. False
natita [175]
The answer is True. Hacking is synonymous with unauthorized access most especially when it is intentional. Unauthorized access is defined as illegally gaining access to a file on a computer. It is the same as accessing a network or system without the permission of the owner.
8 0
3 years ago
When you add text to a slide using presentation software, which of the following is important?
katrin [286]
I think the answer is B. The text should be brief. 
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is an example of a good listening skill? A. Replying to the caller as "you" rather than using his or her
    9·2 answers
  • My computer have black spots and line
    7·2 answers
  • _______ data would be useful for creating a report containing last year's revenue, which won't be changing.      A. Integrated B
    12·1 answer
  • Interest assessments are always accurate. True False
    5·1 answer
  • 1. What does MS-DOS use for input?
    5·1 answer
  • 3. Which of the following is called address operator?<br> a)*<br> b) &amp;<br> c).<br> d) %
    12·1 answer
  • after pouring concentrated disinfectant on larger drops or pools of blood how much contact time should be allowed before attempt
    8·2 answers
  • What special signal is issued periodically from an Access Point and contains the network transmission rate and service set ident
    7·1 answer
  • Henry has created a software product that manages a database of company clients. He wants to install the software on a client's
    13·1 answer
  • ____ a device receiving a process variable
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!