1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ser-zykov [4K]
3 years ago
8

What is the scope of numC?

Computers and Technology
2 answers:
Studentka2010 [4]3 years ago
7 0

Answer:

The answer is passwordMaker

Explanation:

Edge 2020.

GREYUIT [131]3 years ago
5 0

Answer:

local scope which is the entire body of the function/method that it is being used in

Explanation:

The variable numC has a local scope which is the entire body of the function/method that it is being used in, which in this scenario is the passwordMaker method. This is because the variable numC is being used as a parameter variable for that method, meaning that a piece of information is being inputted by when the method is called and saved as the variable numC which is then used by the lines of code inside the method, but cannot be accessed from outside the method thus.

You might be interested in
What is the difference between Remote Assistance and Remote Desktop?
9966 [12]
Remote Desktop allows remote connections and controls how long an invitation to connect remains open; Remote Assistance lets you choose whether to allow connections, not allow connections, and add or remove certain
7 0
2 years ago
Hey mates.........needed asap 1.) Mention and explain four (4) ICT gadgets,
Daniel [21]

1. COMPUTERS: A computer is an electronic device for storing and processing data.  Computers come in various types such as:

a) Personal computers

b) Laptops

c) iPad s

2. FAX MACHINE: fax stand for facsimile i.e. make a copy. It is a device that can send or receive pictures and texts over a telephone line.  

3. AUTOMATED TELLER MACHINE: An automatic teller machine (ATM), commonly called cash point is a computerized device that provides the clients of financial institutions access to financial transaction in a public space without the need of a cashier, human clerk or bank teller.

4. DISPENSING MACHINE (A VENDING MACHINE): This is a machine which dispenses items such as snacks, beverages, lottery, tickets, etc to customers automatically.

7 0
3 years ago
Read 2 more answers
The Spanning Tree Protocol operates at the Network layer of the OSI model.
BigorU [14]

Answer:

False

Explanation:

The Spanning Tree Protocol operates at the Data link layer of the OSI model.

Spanning Tree Protocol (STP) is a bridge and switch (Layer 2 protocol). The STP specification is IEEE 802.1D. STP's primary aim is to guarantee that when you have redundant routes in your network, you do not generate loops. Loops to a network are fatal.

6 0
3 years ago
"Which NET command is used on a Windows PC to establish a connection to a shared directory on a remote server?"
Advocard [28]

Answer:

The Tracert command

Explanation:

The tracert command was created to examine the path that packets take as they cross a network and can resolve a hostname by automatically querying a DNS server. The net command is used to manage network computers, servers, printers, and network drives.

6 0
3 years ago
Select all that apply.
professor190 [17]
Social worker and legal aid worker

4 0
3 years ago
Read 2 more answers
Other questions:
  • This type of connection uses radio waves to connect devices on a network.
    15·2 answers
  • You can access various sites on the WWW by using hyperlinks or by
    14·1 answer
  • You need to delegate AD RMS responsibilities to a junior administrator. You don't want to give the administrator more permission
    14·1 answer
  • Harry Potter and his friends are at Ollivander's with Ron, finally replacing Charlie's old broken wand. Hermione decides the bes
    11·1 answer
  • 1 Point
    14·1 answer
  • Give two reasons you should be aware of your computer's system components and their characteristics.
    10·1 answer
  • Unwanted email sent to large groups of people who did not request the communication is called _____
    12·1 answer
  • The best way to safeguard your document is to save it
    11·1 answer
  • Which of the following is the most significant result of technological innovation?
    10·2 answers
  • Can anyone figure this out???? I need help ASAP!
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!