Answer:
The correct answers are c. can contain special characters d. is case-sensitive
Explanation:
Variable can be referred to as a container used for storing values such as numeric values, memory addresses, characters, character string so it can be used in any part of the program. Every programming language has rules that you must strictly follow while naming a variable, and some of the rules for naming variable in PHP are A variable name can contain letters, numbers, and characters after the first character and A variable name is case sensitive.
Answer:
I have the code written in c++ but the logic will be the same you just have to change the syntax ( if you're writing different language)
Explanation:
please mark brainliest
The CPU performs basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions in the program. This contrasts with external components such as main memory and I/O circuitry, and specialized processors such as graphics processing units (GPUs).
B. Strategic thinking
<u>Explanation:</u>
Strategic thinking helps to come up with great ideas that makes the company better than the other company. One can apply strategic thinking to arrive at decisions that can be related to your work or personal life. Strategic thinking involves developing an entire set of critical skills. Strategic thinking enables a business owner to determine how to use these resources most effectively and advance the company toward its objectives. Strategic thinking focuses the management team on markets that are most likely to succeed.
The standardized framework developed by NIST to be used as a guidance document is;
NIST Special Publication (SP) 800-37 Risk Management Framework for Federal Information Systems and Organizations:
<h3>Computer Frameworks</h3>
The standardized framework by NIST from the FISMA guideline is the NIST Special Publication (SP) 800-37 Risk Management Framework for Federal Information Systems and Organizations.
Now, this standardized framework is simply a Life Cycle Approach used for Security and Privacy, and also it details the Risk Management Framework (RMF).
Read more about Computer Framework at; brainly.com/question/25236672