1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ser-zykov [4K]
2 years ago
8

What is the scope of numC?

Computers and Technology
2 answers:
Studentka2010 [4]2 years ago
7 0

Answer:

The answer is passwordMaker

Explanation:

Edge 2020.

GREYUIT [131]2 years ago
5 0

Answer:

local scope which is the entire body of the function/method that it is being used in

Explanation:

The variable numC has a local scope which is the entire body of the function/method that it is being used in, which in this scenario is the passwordMaker method. This is because the variable numC is being used as a parameter variable for that method, meaning that a piece of information is being inputted by when the method is called and saved as the variable numC which is then used by the lines of code inside the method, but cannot be accessed from outside the method thus.

You might be interested in
Which of the following comments are correct? Select all that apply.
AnnZ [28]

Answer:

1/ hello

Explanation:

7 0
3 years ago
If you were setting up a network with 100 nodes and you wanted no more than 25 nodes per segment: what devices and connections w
STatiana [176]

Since at present number user or nodes in an organization counts is 100 and it can be further extended. Moreover concurrent at presented is 25 nodes is active.

<u>Explanation:</u>

So as best practice network administrator has keep in mind and select hardware application.

1. Server with high end rams and further extendable.

2. Minimum life of hardware such as routers, switch or managed or firewall should be considered or two years. But to technology improvement it is possible for 1 year only

3. Upgradable hardware appliances and software updates should be possible with mini cost effect.

4. Network security   and update or upgradable workstation or desktop or laptop to be consideration.

5. Functional operation of an organization should run smoothly.

8 0
3 years ago
Which two technologies support the building of single-page applications? and are two technologies helpful in building single pag
Sholpan [36]

Answer:

You can use JavaScript, HTML, PHP and so forth.

Explanation:

7 0
3 years ago
Which of the following modes of replication requires a very low latency network connection and ensures data remains in synch wit
Snowcat [4.5K]

Answer:

b. Synchronous replication

Explanation:

Replication of data in storage partitions or in a number redundant array of independent disk drives helps to promote redundancy, as implied, and faulty tolerance to reduce loss of data.

There are two categories of replication and they are synchronous and asynchronous replication.

Synchronous replication requires low latency network site to mirror data, while asynchronous replication mirrors data in large metropolitan area in high latency networks.

4 0
3 years ago
People who enjoy working with their hands might enjoy a career as an
Kaylis [27]
People that enjoy working with their hands might enjoy being a construction worker but their are a lot of other jobs that involve using their hands but being a construction worker takes a lot of effort and a lot of hard work to complete.
6 0
3 years ago
Read 2 more answers
Other questions:
  • What car dealership websites did you use to conduct your research?​
    8·1 answer
  • As it relates to confidentiality, data may be classified in three ways. Match each data classification below to its definition.
    9·1 answer
  • Can you help me correct a sentence?
    13·1 answer
  • What is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet a
    11·1 answer
  • Which does plug-and-play refer to?
    13·2 answers
  • The ____ refers to a world where everyday physical objects are connected to, and uniquely identifiable on, the Internet so they
    6·1 answer
  • Is it better to meet online or offline<br> (Please answer QUICK)<br><br> Thanks :')
    5·2 answers
  • What do you call the spreadsheet cell that is in effect and has a heavier black border around it?
    7·2 answers
  • An alteration threat violates information integrity. <br> a. True <br> b. False
    13·1 answer
  • If there is a secure socket layer in place, what will you need in addition to a user id in order to access the shared files?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!