1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
3 years ago
9

1. Separate valid and invalid variables:

Computers and Technology
1 answer:
DedPeter [7]3 years ago
5 0

Firstly we explain the variable and the declaration rule for the variable and further separating the valid and invalid variables.

  • Whenever a user is given a question, variables are data values that can vary. for example  age, CSL, etc.
  • It may alter and during the execution of the program.
  • It's a storage space for memories.
  • It has a name that corresponds to the location.
  • Data is stored in the memory location.

The rule for variable declaration:

  • The names of your variables should be based on the phrases used in the subject area, and they should reflect the variable's function.
  • By removing spaces between the words, you can make variable names. Each word in the name should be capitalized, including prepositions and pronouns that are one letter long.
  • An underscore should never be used to start a variable name.
  • Single-character variable names should be avoided. For loop counters, only short variable names are permitted.
  • After the state that equals the "true" value, name variables that describe binary states ("true" or "false").

The valid variable is:

CSL, Age,CLS,SEE,Stop5for,Give, $shopping, and United.

The invalid variable is:

Mark-sheet, Tel $, Simple Interest, and 545Newton.

Learn more:

brainly.com/question/2684763

You might be interested in
Which type of processing best describes the correction of errors or the rearrangement of a job's running time?
Neko [114]

Answer:

Real-time

Explanation:

i am sure because on my test it said corect

6 0
4 years ago
Fatima wants to compose and send an email in Outlook. Order the steps she needs to follow to do this task.
Tomtit [17]

Answer:

The steps that Fatima needs to follow in-order to send an email on the Outlook include:

1. Open the Outlook application.

2. Under the Home tab, click the New Email button.

3. Click the To button to choose a contact

4. Click the Send button after typing the message.

Explanation:

For every new email to be sent out through the Outlook, there are steps to follow like ensuring that the Outlook application is appropriately opened. Later, a<em><u> tab showing new email should be clicked to open the dialogue box for typing the email message.</u></em>

<em>After the message has been typed, a contact to whom the message is going to be sent to is selected before actually sending out the message by a click of a button.</em>

7 0
3 years ago
Read 2 more answers
Write a paper, 2-3 paragraphs that discuss how to defend ideas objectively through effective communication. Include the skills n
mojhsa [17]

Wot in tarnation? -_-

  • how to defend ideas objectively the effective communication
  1. Being clear and concrete so that your point gets across without any ambiguity that might make someone else interpret your idea in the wrong way
  2. Use language that is neutral and does not have any negative or positive connotations that might the listener or reader assume you have a bias
  3. Use evidence and data to back up your claim from reputable sources and not just your own personal opinion

  • Skills to prevent conflicts and promote buy-ins
  1. You need to know how to listen in order to communicate effectively, pay attention to how other people respond to what you say so you can either apologize for your behavior or look out for in the future. Listening also shows that you value the other person's opinion and thus might make them more likely to treat you with the same respect
  2. Encourage other people to buy into your ideas by being confident about them and again using evidence so that people can trust what you're saying has some merit to it.
8 0
3 years ago
What are the arguments both for and against the exclusive use of Boolean expressions in the control statements in Java (as oppos
dezoksy [38]

Answer:

The correct answer to the following question will be "Primary argument".

Explanation:

The primary argument for the use of Boolean operators or expressions exclusively as regulation expressions seems to be the flexibility resulting from forbidding for the above usage a broad variety of styles.

  • For illustration, in C some statements of a certain sort may present as a command statement so that the compiler sometimes doesn't recognize irregularities in grammatical mistakes that resulted in links to a variable of inappropriate forms.
4 0
3 years ago
When discussing the behavior of vulnerability assessments which choice will exploit a weakness?
yKpoI14uk [10]

Answer:

a) Penetration test

Explanation:

A penetration test, often referred to as a pen test, is part of important process in the development of internet facing service. It is a process of determining if vulnerabilities are actually exploitable in a particular environment.

In other words, it is a process that involves a simulated cyber attack against computer system to check for exploitable vulnerabilities or attempts to actively exploit weaknesses in an environment.

Hence, when discussing the behavior of vulnerability assessments the choice that will exploit a weakness is PENETRATION TEST.

5 0
3 years ago
Other questions:
  • Which is the most likely problem if your computer starts up​ slowly, has many unwanted​ pop-up advertisements, and unusual hard
    5·1 answer
  • Which of the following is an extension of the fill pattern Sunday,Tuesday?
    7·1 answer
  • Andrew wants to create a website for his college. Which web-based programming language should he use?
    11·2 answers
  • When choosing a new computer to buy, you need to be aware of what operating it uses.
    12·1 answer
  • The clerk ordered three ribbons, 12 markers, and 15 erasers.
    10·1 answer
  • Two DHCP servers, Server1 and Server2, are running Windows Server 2016. As the administrator, you create a scope called Scope1.
    8·1 answer
  • At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this
    10·1 answer
  • PLEASE HELP ME! Sam was researching rocks and minerals. He thought the Web site looked unprofessional, so he looked for the auth
    11·1 answer
  • What principle of animation helps facial features to be noticed?
    7·2 answers
  • When i add someone to canvas course, do they get an invitation?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!