1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
10

What is a variable in programming?

Computers and Technology
1 answer:
HACTEHA [7]3 years ago
3 0
A symbol or set of characters in a programming statement whose value can be changed
You might be interested in
The programming interface between an application program and the dbms is usually provided by the
Inessa05 [86]
The Data Access API.
8 0
3 years ago
Write a program that keeps track of a simple inventory for a store. While there are still items left in the inventory, ask the u
MissTica

Answer:no

Explanation:

3 0
3 years ago
Read 2 more answers
What modifier should you use on the members of a class so that they are not accessible to another class in a different package,
vova2212 [387]

The private modifier specifies that only other members of the same class can access the member. The protected modifier restricts access to the member to within its own package.

<h3>What are public and private modifiers?</h3>

The public access modifier permits code from both inside and outside the class to access the class's methods and properties, whereas the private modifier prevents outside code from accessing the class's methods and properties.

Thus, private modifier is the member.

For more details about private modifier, click here

brainly.com/question/15108837

#SPJ1

5 0
2 years ago
In computer security what do the rows and columns correspond to in an 'Access Control Matrix'. What does each cell in the matrix
Tcecarenko [31]

Answer:

Explanation:

An Access Control Matrix ACM can be defined as a table that maps the permissions of a set of subjects to act upon a set of objects within a system. The matrix is a two-dimensional table with subjects down the columns and objects across the rows. The permissions of the subject to act upon a particular object are found in the cell that maps the subject to that object.

Summary

The rows correspond to the subject

The columns correspond to the object

What does each cell in the matrix contain? Answer: Each cell is the set of access rights for that subject to that object.

4 0
3 years ago
Choosing the “Quick Print” button will ____________.
harkovskaia [24]
Choosing the "Quick Print" button will print to the default print (Answer is B). The quick print function is accessible in the Quick Access Tool bar . By clicking the drop down arrow of the quick access tool bar it will let you choose different types of default access including your Quick print.
7 0
4 years ago
Other questions:
  • There are several vehicles in a parking lot. Some of them are motorcycles
    8·2 answers
  • Jason needs to design the colors for a web site that make it easy to read. Which should he consider using?
    9·1 answer
  • Grace Hopper led the development of ______, a programming language for business applications.
    6·2 answers
  • A _____ is a harmful program that resides in the active memory of a computer and duplicates itself. Select one: a. scareware b.
    7·1 answer
  • I have this assignment due TONIGHT BEFORE 10PM! Please help. 50 points for whoever will help!! Here is the assignment.
    7·1 answer
  • How many questions have you seen so far other than this one?
    10·2 answers
  • For a business that is properly using a social media information system, the system can
    13·1 answer
  • Why do we need to learn about engineering and technology?
    6·1 answer
  • Here’s my last question
    12·2 answers
  • Examine the following output:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!