1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weeeeeb [17]
3 years ago
14

What are variables in Q Basic programs​

Computers and Technology
1 answer:
AlexFokin [52]3 years ago
4 0

Answer:

1. Numeric variable:

A variable which can store numeric value is called numeric variable.

e.g.

A=12

pi=3.14

c=79.89

2. String variable:

A variable which can store string variable is called String variable. String is a array of character enclosed within the double inverted comma.

e.g.

N$="ram"

Place$="Kirtipur Kathmandu"

note that a string variable ends with $

Explanation:

A variable is a quantity which can store value in computer memory. A variable is also a quantity whose value changes during the execution of a program. Like in mathematics a variable holds certain value Just in QBASIC; it is a placeholder for storing value in computer memory

You might be interested in
Which of the following is true about binary search. A. It uses binary numbers in its algorithm B. It is slower than sequential s
trapecia [35]

Answer:

<u> A. It uses binary numbers in its algorithm</u>

Explanation:

A Binary search is a type of algorithm designed to look through <em>only </em>a sorted array of data for a particular item.

It is<em> more efficient (faster) </em>than sequential search since the algorithm doesn't have to look up the entire array of data, but simply repeatedly divide in half the section of the array that could contain the searched item.

4 0
2 years ago
Are u a chicken nugget!!??
creativ13 [48]
Yes. Yes I would classify myself as the nugget of the chicken thank you for asking me. 
3 0
3 years ago
Read 2 more answers
Create and execute a SELECT statement that would provide data for a vendor directory. Display should include vendor number, vend
Luba_88 [7]

Answer:

SELECT vendor_number, vendor_name, CONCAT ('street', ' ' , 'city', ' ' , 'state', ' ' , 'zip code') as adress

FROM vendor_directory

ORDER BY vendor_name ASC;

Explanation:

* Suppose <u>vendor_directory</u> is the name of the table from which you extract the data with the SELECT sentence.

8 0
3 years ago
A qualifier distinguishes the set of objects at the far end of the association based on the qualifier value.
Andrei [34K]

Answer:

True

Explanation: A qualifier is a term used in IT(information technology) and computer software. It is used to differentiate/ identify and select different sets of objects that are located at the far ends of a qualifier association.

A qualifier is usually used to identify an object from a set of closely related and similar objects, they are usually small boxes possibly with a rectangular shape.

7 0
2 years ago
You are the network administrator for a small organization of 100 users. Users till now were freely browsing the Internet. You w
Schach [20]

Answer: Proxy server

Explanation: Proxy server is a type of server that is acts as interface between the network on huge scale and any local network. This server provides the feature of security, operations, privacy etc in the network system. They also help in improving the performance of the network.

It can work as the web filter to eliminate the unwanted websites.They acts as the gateway by  observing the website that is being browsed by the other user.Thus installation of proxy server should implemented on the organization.

8 0
3 years ago
Other questions:
  • Which of the following statements are true about the Internet?
    14·1 answer
  • Although the battery on your smartphone is fully charged, it drains quickly. In some instances when the phone shows that the bat
    12·1 answer
  • Text, numbers,graphics, sounds entered into a computer's memory during input operations are referred to as
    11·1 answer
  • Your bank contacts you asking you to phone a number supplied in the email.What do you?
    13·2 answers
  • Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?
    12·2 answers
  • Select the correct answer.
    12·1 answer
  • What is the statement describing? Agile team continuously adapt to new circumstances and enhance the methods of value delivery
    6·1 answer
  • Which of the following statement is correct? Select one: a. Base register holds the size of a process. b. Limit register holds t
    10·1 answer
  • What are the benefits of building redundancy into a network?
    12·1 answer
  • I re-made the human version of Daddy Dearest from Friday Night Funkin
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!