1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weeeeeb [17]
3 years ago
14

What are variables in Q Basic programs​

Computers and Technology
1 answer:
AlexFokin [52]3 years ago
4 0

Answer:

1. Numeric variable:

A variable which can store numeric value is called numeric variable.

e.g.

A=12

pi=3.14

c=79.89

2. String variable:

A variable which can store string variable is called String variable. String is a array of character enclosed within the double inverted comma.

e.g.

N$="ram"

Place$="Kirtipur Kathmandu"

note that a string variable ends with $

Explanation:

A variable is a quantity which can store value in computer memory. A variable is also a quantity whose value changes during the execution of a program. Like in mathematics a variable holds certain value Just in QBASIC; it is a placeholder for storing value in computer memory

You might be interested in
Isla is writing a report on the best roller coasters in America. Which device could help her with this?
Ulleksa [173]

Answer: a device that can help could be a map.. she could learn about that place then see if its coasters are better.

Explanation: i dunno if i'm right

~shina~

4 0
3 years ago
John have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the da
xeze [42]

Answer: Mutual authentication

Explanation: Mutual authentication could be referred to a vetting process where the two entities in communication authenticate each other, it could also be referred to as a two-way authentication.

In the scenario above, the cloud service or server authenticates itself with the client and the client authentication itself with the cloud service server by verifying or vetting the certificates of both communicating entities before a secure encrypted connection would be established or created.

8 0
3 years ago
Read 2 more answers
In what type of attack does the adversary leverage a position on a guest operating system to gain access to hardware resources a
il63 [147K]

Answer:

VM escape attack

Explanation:

<em>In a VM escape attack, the attacker exploits hypervisor vulnerabilities to gain control over resources reserved for other guest operating systems. Services operating on the guest may be exposed to the other attacks, but such attacks can only access data allotted to the same guest. In the event of a buffer overflow or directory traversal or the client in the case of cross-site scripting.</em>

6 0
2 years ago
Give a name of the part responsible for memorising a cell phone number​
erik [133]

cerebrum

Explanation:

it controls all voluntary actions and also controls all the higher thought processes such as memory, judgement and reasoning

4 0
3 years ago
This function checks if a character is a vowel. If it is, it returns true. Otherwise, it returns false. Where should return fals
Marianna [84]

Answer:

at the end, i.e., after the for loop.

Explanation:

see code.

I also added a cooler alternative implementation.

6 0
3 years ago
Other questions:
  • A predictive data analyst ___
    11·1 answer
  • Here is a series of address references given as word addresses: 2, 3, 11, 16, 21, 13, 64, 48, 19, 11, 3, 22, 4, 27, 6, and 11. A
    9·1 answer
  • The Android operating system was invented by ______.
    13·1 answer
  • When writing code, how can printing be useful?
    15·1 answer
  • There are two circular grounds Ground-A and Ground-B. Ground-A is having diameter of 15 meters and Ground-B is having diameter o
    7·1 answer
  • Withdrawal from a conflict is best used when ______.
    6·2 answers
  • Jobs with only 7 letters
    7·2 answers
  • If you aren’t familiar with the idea of a leap year, read “Why Is There a Leap Day?” before continuing with the lab.
    6·1 answer
  • Take values of length and breadth of a rectangle from the user and check if it is square or not.
    8·2 answers
  • What is the main coding language for netflix?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!