1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
3 years ago
9

What are the data type(s) will be used to declare the variable(s) needed to

Computers and Technology
1 answer:
postnew [5]3 years ago
4 0
The three primitive data types used in this course are int (integer numbers), double (decimal numbers), and boolean (true or false). Each variable has associated memory that is used to hold its value.
You might be interested in
Which character formatting effect makes text appear in a small font size below the midpoint of a line of text
pav-90 [236]

Answer:

Superscript or Subscript

Explanation:

The superscript or the subscript is a type of character which is set a little lower or more than the normal line of type. And it is generally small as compared to the other texts. The subscript does appear at or less than the baseline, and the superscript is above. And for the superscript, you need to press the Ctrl + Shift + + ( press and at the same time also hold the Ctrl and the Shift, and finally press the +). And for the subscript, you need to press the Ctrl + Shift ++(Press and at the same time also hold the Ctrl. and finally press the =). And pressing the corresponding shortcut once again, you will be back to the normal text.

4 0
3 years ago
If you were going to construct a table that only included shapes name with number prefixes, which shape would you inlcude?
Annette [7]

Answer: Triangle

Explanation: Triangle has Tri

8 0
3 years ago
What are the advantages and disadvantages of using wireless communications? What are the advantages and disadvantages of using w
Nimfa-mama [501]

Answer:

<u>Advantages of wireless communication:-</u>

  • Flexibility in transferring the message through communication for which the sender and receiver can be in any place.
  • Speed of the communication is accurate and fast
  • Due to no wiring , the cost of the wireless communication is less.

<u>Disadvantages of wireless communication:-</u>

  • The security is less as the data can be accessed by unauthorized sources at times.
  • The setting up of wireless communication complex and expensive.

<u>Advantages of wired communication:-</u>

  • Simple configuration
  • Higher bandwidth is present in the cable
  • High reliability

<u>Disadvantages of wired communication:-</u>

  • Mobility is present for communication
  • Installation requires lot of time due to cabling
  • Requires extra devices for covering large areas for communication

Wireless communication is more preferable than wired communication in the conditions like communication connection that should face low damage and longer life which is not present in cable connection as they break or get disrupted.The flexibility of moving while communication is required by most people so, they use wireless communication .

8 0
4 years ago
Jensen is a senior developer for Hackers R'Us, a company that helps secure management information systems. Jensen's new task is
Harlamova29_29 [7]

Answer:

b. white-hat hacker

Explanation:

A White-hat Hacker, also known as an Ethical Hacker is an information security specialist, known for performing penetration testing and checks in search for information and communications system's vulnerabilities on demand for his/her clients.

These efforts are meant to find security risks before someone else does, who could cause any kind of damage to the systems or unauthorized access to sensitive information

6 0
3 years ago
Looking at the example below is the type value equal to a string or an integer?
Simora [160]
B. Integer I think that’s the answer
5 0
3 years ago
Read 2 more answers
Other questions:
  • In this code, identify the repeated pattern and replace it with a function called month_days, that receives the name of the mont
    14·1 answer
  • You have been asked to create an authentication security plan for your company. Which of the following components would you inco
    14·1 answer
  • Hanging out with friends, watching your favorite TV show, and buying a pair of new shoes are all examples of _____ for doing wel
    5·2 answers
  • A computer has a memory ________, rather than just a single memory component. The lowest level is some form of ________ storage
    11·1 answer
  • Which of the following devices is used to connect a computer to a network
    7·1 answer
  • Complete the function void update (int *a, int *b), which reads two integers as argument, and sets a with the sum of them, and b
    8·1 answer
  • _____ provides vital protection and maintenance services for system hardware and software, including enterprise computing system
    12·1 answer
  • What is one reason why a business may want to move entirely online?
    12·1 answer
  • Which one of the statements best characterizes the current state of e-commerce?
    15·1 answer
  • What does it mean when the lottery machine says function suppressed after scanning a ticket
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!