1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firdavs [7]
3 years ago
8

When assigning a value to a string, which of the following rules needs to be followed?

Computers and Technology
1 answer:
Alecsey [184]3 years ago
4 0

Answer:

Let's say you need to remember some information, the way moviegoers tried to remember the name of the movie. Instead of storing it in your human memory, you can store information in your computer's memory using Python. This is called assigning a string value to a variable.

To assign a string value to a variable in Python, follow this example. Select each part of the code to see how it works with the movie title example.

movieTitle = "Live. Die. Repeat."

This line of Python code is an example of an assignment statement. In an assignment statement, you tell Python, "This variable is assigned this string value."

Explanation:

You might be interested in
In today's workplace, most employers issue a policy stating that they will monitor employees' use of any company-owned computer,
julia-pushkina [17]

<u>Organizations monitor, retain, and review employees emails:</u>

Today’s digital world most of business runs through employee emails. In an organization monitoring the email is most important event for security purpose and keep necessary backup so that it can be restore at any given point of time. If an organization is not monitor employee’s email system or server, then the organization is high risk.

As policy of an organization monitor employee’s email is must and watched carefully. Any important document is leaked or forwarded to wrong email address, then is high risk for an organization

As policy has to be drafted and signed by employee of an organization.

7 0
4 years ago
What effects will the different types of lighting produce on mountains?
bonufazy [111]
Once enough charge has been separated in a growing storm, a lightning flash can occur. These normally travel within or between clouds (abbreviated CC) or from cloud to ground (CG). Most storms produce more CC than CG flashes--about six times as many in tropical storms and two times as many in midlatitudes. Sometimes a flash will travel from cloud to air or simply occur within "clear" air.

Exactly what triggers flashes is still uncertain and an area of continued research. It seems that very concentrated electric fields (perhaps at the ends of pointed surfaces or single particles) are needed to accelerate charged particles, or ions. Once moving with sufficient energy, the ions appear to blaze a path toward opposite charge in cascading fashion.

3 0
3 years ago
Several different tunneling protocols can be used in dial-up situations. Which of the following would best be used as a VPN tunn
melomori [17]

Answer:

The answer is the point - to -point protocol, which allows user to set a secure VPN connection for client and server connectivity.

Explanation:

A virtual private network is a private-public network because of encryption and tunneling to ensure the integrity of the data. VPN requires a tunnel to work and encryption.

In VPNs, there are different protocols can be used, such as point- to - Point Tunneling Protocol (PPTP), IPSec, and L2TP.

Point to Point Protocol is a Microsoft protocol which allows user to set a connection and secure VPN destination. Point to point protocol is designed for client and server connectivity. It developed a connection between two computers. The data link layer that transmits over IP networks is used for point to point tunneling.

Such as option A is not correct because it is distracter and IPSecis primary tunneling protocol. It supports only IP networks. L2TP is not a VPN but extend VPN over the various network.

3 0
3 years ago
In G mail, when we want to write an email to multiple recipients in such a way that the recipients couldn't understand that we h
Inessa05 [86]

Answer:

Bcc

Explanation:

Every recipient email address you enter into the “to” and “cc” fields will be able to see each other. The email addresses you add to the “bcc” field will not be visible to the “to” and “cc” recipients or the other “bcc” recipients.

7 0
3 years ago
Read 2 more answers
There is a file "IT4983" in my home (personal) directory. I don’t know my current working directory. How can I find out the file
RoseWind [281]

Answer and Explanation:

Find / -name "IT4983"

See what it will do is it will find the file named IT4983 in the root directory.

run this commmand with sudo just in case for permission issues.

then it will give you the location of that file we want to find.

 

Or

$ file /home/IT4983 ( you can type this command from whichever directory you are )

output : IT4983 , ASCII TEXT

3 0
3 years ago
Other questions:
  • Define a function print total inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: The
    12·1 answer
  • How does consumption of alcohol affect your driving skills? Name three ways that alcohol can affect your driving.
    15·2 answers
  • Question 12 :A user complains that his computer is taking a long time to boot. During the boot process, you observe that the har
    7·1 answer
  • When at the rightmost cell in a row, press the ENTER key to move to the first cell in the next row; do not press the TAB key.
    14·1 answer
  • Other drivers and pedestrians expect you to be sober and attentive, so you are responsible for ___________.
    15·2 answers
  • Brad is joining a big website design firm. He is worried that he may not be able to adapt to the company culture. What can he do
    15·1 answer
  • _____emphasizes on proper breathing and the mind-body-spirit connections.​
    6·2 answers
  • Convert 10101010 into decimal number system​
    13·2 answers
  • Anybody want to help me figure out how to put this on a resumè
    12·1 answer
  • Which option best describes top-down design?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!