1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna35 [415]
2 years ago
10

What is another word for: a location in memory that contains a value? A. integer B. Boolean C. variable D. float PLEASE HELP URG

ENT
Computers and Technology
1 answer:
german2 years ago
5 0

Answer:

A

Explanation:

Integer because it contains digits that can undergo calculation within the memory

You might be interested in
Which of the following would most likely be responsible for configuring firewalls and IDPSs, implementing security software, and
kondaur [170]

Answer:

Security Technician

Explanation:

A secutity technician maintains security files by receiving, processing, and filing computer security forms; documents, and agreements. He/she also provides information by collecting, analyzing, and summarizing data and trends. They update job knowledge by participating in educational opportunities.

Cheers

5 0
3 years ago
Read 2 more answers
Provide an example of a time in your personal or work life when you used the household measuring system and measured out an exac
Svetach [21]

Answer:

Cooking

Explanation:

Cooking and baking would be the easiest answer to come up with. It's the most practical thing that you would be measuring liquids and solids for. For example, you should measure how much water or flour you use when making food. Try and think of a time you may have used a measuring cup of some sort.

8 0
3 years ago
Generally speaking, manufacturing overhead is applied to production by means of a __________ __________ __________, which is com
Mkey [24]

Answer: Predetermined Overhead Rate, Estimated Manufacturing Overhead and Annual Activity Level.

Explanation:

Generally speaking, manufacturing overhead is applied to production by means of a predetermined overhead rate, which is computed under the general formula of dividing estimated overhead rate by some measure of the annual activity level.

A predetermined overhead rate is usually calculated at the beginning of an accounting period. It is calculated by dividing the estimated manufacturing overhead by an activity driver (e.g machine hours).

5 0
3 years ago
Read 2 more answers
Wow that funny a heck
lorasvet [3.4K]

Answer:

Seriously??? Omg - Orange Trump!!

3 0
2 years ago
Which decimal number is equivalent to this hexadecimal number?<br> F8
emmainna [20.7K]

Explanation: The numbers in a hex are the same as decimal numbers: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9. The big difference between a hex and a decimal is that a hex also contains letters. These letters are: A, B, C, D, E, F. A hex number can be represented using a subscript of 16.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which translator program reads small portions of a program at a time, translating them into machine instructions which are then
    12·1 answer
  • According to the Computing Research Association, the number of undergraduate degrees awarded in computer science at doctoral-gra
    11·1 answer
  • Web crawlers or spiders collect information from Web pages in an automated or semi-automated way. Only the text of Web pages is
    10·1 answer
  • Which practice is the safest way to sit at a desk while typing on the computer?
    12·1 answer
  • Why 3 phase motors so effective?
    5·1 answer
  • Which of the following is NOT a good way to treat an EPA or OSHA inspector?
    15·2 answers
  • What is the main function of processing unit​
    5·2 answers
  • Write a class Bug that models a bug moving along a horizontal line. The bug moves either to the right or left. Initially, the bu
    13·1 answer
  • The computer stores currently used programs and data in ________.
    9·2 answers
  • Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!