1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weeeeeb [17]
3 years ago
14

What are variables in Q Basic programs​

Computers and Technology
1 answer:
AlexFokin [52]3 years ago
4 0

Answer:

1. Numeric variable:

A variable which can store numeric value is called numeric variable.

e.g.

A=12

pi=3.14

c=79.89

2. String variable:

A variable which can store string variable is called String variable. String is a array of character enclosed within the double inverted comma.

e.g.

N$="ram"

Place$="Kirtipur Kathmandu"

note that a string variable ends with $

Explanation:

A variable is a quantity which can store value in computer memory. A variable is also a quantity whose value changes during the execution of a program. Like in mathematics a variable holds certain value Just in QBASIC; it is a placeholder for storing value in computer memory

You might be interested in
The SQL SELECT built-in function COUNT ____.
tia_tia [17]

The SQL SELECT built-in function COUNT none of the above options.

<h3>What is a SELECT query?</h3>

A select query is known to be a kind of a database object that depicts the information that is shown in Datasheet view.

Note that A query does not save data, it shows data that is saved in tables.  The SELECT statement is known to be one that is often used to select data from what we call a database.

Hence, The data returned is said to be saved in a result table, known to be the result-set.

Based on the above, the SQL SELECT built-in function COUNT none of the above options.

Learn more about  SQL SELECT from

brainly.com/question/10097523

#SPJ1

5 0
2 years ago
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra
Sergeu [11.5K]

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

8 0
3 years ago
How much should I borrow on a direct loan
olga_2 [115]
I recommend between $5,500 and $12,500 each year.
7 0
3 years ago
Once you have saved a block of text for easy insertion in other documents, it will show up where?
kherson [118]
Click file and look up the name
7 0
3 years ago
Which of the following tools enables users to connect to a remote computer, including servers with no interaction required from
musickatia [10]

Answer:

Option (A) i.e., Remote Desktop is the correct answer to the following question.

Explanation:

The following option is correct because the remote desktop is an application or software which connects your computer to another system through the internet from anywhere and we can also connect with each other without the internet but in a range.

<u>Steps to connect in Windows 10</u>:

Step-1: Firstly, start your window and click on the start button.

Step-2: Then, type remote setting in search box.

Step-3: Then, you have to allow the remote access to the system.

Step-4: Then, you have select the Remote Tab which appears in System Properties.

Step-5: Then, you have to click and select the to Allow the Remote Connection.

7 0
3 years ago
Other questions:
  • You have installed a device that has eight interfaces and does not forward broadcast packets. What kind of device did you instal
    6·2 answers
  • An example of what you can post that shows kindness to other
    15·1 answer
  • What part of the computer gives access to the internet
    10·1 answer
  • Yahoo and Google are examples of __________ used to perform Internet research.
    14·2 answers
  • 15. Write a program in python to read three numbers in three variables and swap first two variables with the sums of
    8·1 answer
  • 1. If an F# function has type 'a -&gt; 'b when 'a : comparison, which of the following is not a legal type for it? Select one:
    14·1 answer
  • Malwar is the short form for malicious software and used to refer​
    14·1 answer
  • Renee works for a television series. Her responsibility is to transfer data from the camera to a hard drive. What is her job des
    5·1 answer
  • List the types of infrared we have
    12·1 answer
  • Friday Night Funkin Fans, does this count as a leak if I share it?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!