1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Volgvan
3 years ago
11

Explain the integer and float datatypes with example.​

Computers and Technology
1 answer:
Leno4ka [110]3 years ago
6 0

Answer:

integers are natural numbers like 1,2,3,.....

Float data types are those that are in the form of decimals like 1.5, 2.33. 0.75

You might be interested in
What will the output be from the following program?
ser-zykov [4K]

Answer:

3 + 4 hope it helps for you

Explanation:

mark brainest

7 0
3 years ago
Importancia del sistema operativo
love history [14]

Answer:

Un sistema operativo es el software más importante de tu computador, ya que se encarga de gestionar el hardware, el acceso a la memoria, acceso a la CPU y controlar gran parte de las tareas que lleva a cabo tu computador.

7 0
2 years ago
What is the default method of referencing cells in formulas?
ELEN [110]
In Microsoft Excel, cell referencing is the method by which you refer to a cell or series of cells in a formula. Cell referencing is not important unless you plan to copy the formula to a number of other cells. In Excel, cell referencing is relative by default
7 0
3 years ago
Put these events in the order in which they occurred,
lakkis [162]

Answer:

  1. Local fisherman recover the body of Major Martin off the coast  of Spain .
  2. Spanish officials pass off the information in the briefcase to  German agents.
  3. Major Martin's name appears on a casualty list in a British  newspaper.
  4. Germany prepares for an imminent attack on the island of  Sardinia.

Explanation:

This above is the order in which Operation Mincemeat was executed in WW2 to deceive the Germans into believing that the Allies were going to invade the Balkans directly instead of Sicily which was their actual target.

The plan involved a fictitious Major Martin who had secret documents about the Allied invasion of the Balkans. After the body was released from a British submarine, it washed up in Spain where it was found by local fishermen.

Spanish officials then passed the information in the briefcase Major Martin had to German intelligence. To further reinforce the ruse, the British published Major Martin's name in a casualty list.

The Germans were thoroughly convinced and switched forces from Sicily for the defence of the Balkans and the island of Sicily.

5 0
3 years ago
Nunya is a computer software company that employs highly intelligent, but somewhat unusual people. Every Friday, free lollipops,
mario62 [17]

Answer:

c. Stories

Explanation:

Informing employees about the founders by telling them at the beginning of each quarterly executive meeting, that the founders were three young people who got lucky and sold a video game that they invented is an example of stories technique for transmitting culture.

Cultural transmission is a learning process through which cultural elements, such as background ideas, attitudes, beliefs, ideals and historical values are passed on to individuals and groups.

3 0
3 years ago
Other questions:
  • HELPPP ASAPP
    8·2 answers
  • How does consumption of alcohol affect your driving skills? Name three ways that alcohol can affect your driving.
    15·2 answers
  • How does technology set a negative impact on the adolescent of our society?
    14·1 answer
  • A variable must have its type declared but it is not required to be initialized prior to first use.
    12·1 answer
  • Wich is the last step in conducting a URL search
    14·2 answers
  • All of the following activities may infect your computer with a virus EXCEPT ________.
    6·1 answer
  • Difference between change management n asset management
    11·1 answer
  • Emma lives in Pennsylvania, what climate does she live in?
    7·1 answer
  • a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
    15·1 answer
  • HELP ME PLEASE 41 PTS
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!