1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kipish [7]
3 years ago
5

This is an example of ______________ of variables:

Computers and Technology
1 answer:
Sedbober [7]3 years ago
6 0

Answer:

Encapsulation is an example of variables

You might be interested in
true or false, the random number generator (data analysis tool) requires you to copy paste special value in order to create stat
Vladimir79 [104]

The random number generator (data analysis tool) requires you to copy paste special value in order to create static random value(s) is a false statement.

<h3>What is the meaning of random number?</h3>

A random number is a pick of a number made seemingly at random from a certain distribution such that the distribution is reproduced when a large collection of these numbers is chosen. Such numbers must almost always be independent in order to prevent relationships between succeeding numbers.

Therefore, a hardware or software algorithm known as a random number generator produces numbers at random from a finite or infinite distribution. Pseudo-random number generators and real random number generators are the two primary varieties of random number generators.

Learn more about random number generator from

brainly.com/question/10352102
#SPJ1

8 0
10 months ago
Why is group design better or worse for coding projects ?....will report for a dum answer U ` U
DedPeter [7]

there are many styles of coding think about it like art if you had 15 painters working on the same 4x4 painting it would look like a mess.

-scav

8 0
3 years ago
Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not
Nataly_w [17]

Answer:

This question was initially incomplete. Here is the full question:

Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?

a) The activities of a user browsing in an anonymous window will not be visible to people who monitor the user's network, such as the system administrator.

b) Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.

c) A user will not be able to log in to e-mail or social media accounts during the anonymous browsing session.

d) A user browsing in an anonymous window will be protected from viruses launched from any Web sites visited or files downloaded.

The correct answer is b) Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.

Explanation:

For e-commerce sites, shopping cart information are stored as cookies on the visitor's computer such that when the website visitor leaves the website and comes back a few days later, their shopping preferences are remembered.

If the website visitor uses an anonymous window, the cookies created during the browsing session will be deleted when the anonymous website is exited and so, items placed in the shopping cart for future purchase will not be saved.

3 0
3 years ago
Hey does anyone think nervegear would be possible? (Just asking)
Vlada [557]

Answer:

Depends

Explanation:

Technology is not advanced yet, so building a fully functional nerve gear is difficult. It could be possible in a few years though.

7 0
3 years ago
Read 2 more answers
What's your opinion on sentrent (it's a Pokemon)​
Vadim26 [7]

Answer:

Hes really nice

TSUNAMI SUSHI HAS A TSUNAMI OF ADMIN ABUSE!! TSUNAMI SUSHI HAS A TSUNAMI OF ADMIN ABUSE!! TSUNAMI SUSHI HAS A TSUNAMI OF ADMIN ABUSE!! TSUNAMI SUSHI HAS A TSUNAMI OF ADMIN ABUS!Chicken wing

Chicken wing

Hot dog and baloney

Chicken and macaroni

Chillin with my homies

Chicken wings

Chicken wings

4 0
2 years ago
Read 2 more answers
Other questions:
  • The approved detail design resulting from the __________ serves as a basis for making the decision to begin production.
    8·1 answer
  • If you can't get the keys away from a drunk friend, it is better to call the police than to let them drive drunk. A. True B. Fal
    10·1 answer
  • Explain why the control bus is not a bus.
    7·1 answer
  • In this context, the word “session” refers to _____.
    5·2 answers
  • List the seven basic internal components found in a computer tower
    7·1 answer
  • A binary search algorithm is written (as in the modules, for example) which searches a pre-sorted array for some user-defined va
    14·1 answer
  • Because it allows their files to be accessed from any device on the Internet, many users like to back-up their files using ___ s
    14·1 answer
  • Deleting anitem from a linked list is best when performed using two pointersso that the deleted item is freed from memory.
    7·1 answer
  • 12. When computer professionals take on jobs, they may not enter into relationships with which of the
    6·1 answer
  • Wirte a program which asks the users to input length and calculates the area of a square.( Area = Length^2)​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!