1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kruka [31]
3 years ago
11

Which of the following shows the assignment of a string to a variable? Select 3 options.

Computers and Technology
2 answers:
satela [25.4K]3 years ago
7 0

Answer:

23, (23)

Explanation:

kozerog [31]3 years ago
5 0

Answer:

⬇️

Explanation:

answer = "23"

answer = input("How old are you? ")

answer = '23'

correct on edg. 2021

You might be interested in
________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
andrew-mc [135]

Investigating system logs helps in determining the cause of a security threat in an incident response plan.

<h3>What do system logs works for?</h3>

A system log is known also as syslog. This is known to be that part of a system that tells or show the  records of all the actions that takes place in an operating system.

Conclusively, the Investigating system logs helps in determining the cause of a security threat in an incident response plan because it will tell all of the startup messages, system changes and other processes that took place in the system.

Learn more about security threat from

brainly.com/question/25758530\

#SPJ1

3 0
2 years ago
Cleaning the keyboard is the most important part of keeping your computer running at peak performance.
tester [92]
False although it is important it wouldn't be the most important
8 0
3 years ago
Read 2 more answers
In a systems development life cycle (SDLC) model, the purpose of the _____ is to create a physical model that will satisfy all d
Tom [10]

Answer:

systems design phase.

Explanation:

In a systems development life cycle (SDLC) model, the purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system.

This ultimately implies that, that system design involves determining the overall system architecture, which is typically comprised of hardware, end users, physical processing components, software, and the communication channel that will effectively and efficiently satisfy the essential requirements of the system.

The system inputs and outputs will be designed along with a plan of the way the system's features will be navigated.

Basically, system design is divided into two groups;

I. Logical design.

II. Physical design.

The design of service systems is the process involved in planning, creating infrastructure, building communication, organizing staffs and standardization of a system so as to improve its quality and business relationships between the service provider and its clients. A characteristic that can be used to guide the design of service systems is to ensure services cannot be inventoried.

4 0
3 years ago
Which of the following statements invokes the GetDiscount function, passing it the contents of two Decimal variables named decSa
MrRissso [65]

Answer:

C.

Explanation:

decDiscount = GetDiscount(decSales, decRate)

is the correct statement. The function GetDiscount has two parameters "decSales" and "decRate", the result from the function is assigned to "decDiscount".

4 0
3 years ago
Which of these are forms of data? Check all that apply.
kicyunya [14]
Files, photos, text. Podcast is just on the internet all together so not really saved data while graphs is more of a saved file. So I’d just say files,photos and texts.
6 0
4 years ago
Read 2 more answers
Other questions:
  • What is industry 4.0 -automation revolution-, what is your opinion about the direction this revolution is taking the industry in
    8·1 answer
  • Purpose Your goal is to create a design for a software interface. You will experience the scope of the design process from brain
    7·1 answer
  • What are two constraints that continuous-media files have that conventional data files generally do not have?
    12·1 answer
  • How to get bing with any node unblocker
    10·2 answers
  • In C!!
    11·1 answer
  • Superclass in python explanation
    7·1 answer
  • Write a program that repeatedly reads in integers until a negative integer is read. The program keeps track of the largest integ
    9·1 answer
  • What is phishing?
    14·1 answer
  • What is the complete path and filename of the file where ports and their associated protocols are defined
    12·1 answer
  • What is the value of six sigma ? How dose it relate to agile management
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!