1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
5

Select the data type for each example below. Possible answers -Int -float -string

Computers and Technology
1 answer:
Veseljchak [2.6K]3 years ago
6 0
Float string int
I hope my answer helps.
You might be interested in
What is the purpose of application software policies?
timofeeve [1]

Answer:

d. They serve to help educate users on how to use software more securely.

Explanation:

A software policy can be defined as a set of formally written statements that defines how a software application or program is to be used.

The purpose of application software policies is that they serve to help educate users on how to use software more securely. It must be easy to read, learn and understand by the end users.

7 0
3 years ago
What are the cloud storage components
Burka [1]

Answer:

The main physical components of cloud infrastructure are networking equipment, servers and data storage

6 0
2 years ago
Classes cannot:
dexar [7]

Classes cannot Initialize data members in the class definition.

B) Initialize data members in the class definition

<u>Explanation:</u>

Class is defined by end user data type where it can handle multiple data type and referred to other classes also. Class is also called as data structure object or object class.

Due to class methods total programming language coding style is changes. For example employee of an organization should hold his or her employee number, address detail, spouse details, salary details

Where in old style programming language we need to declare separate variable to hold the data types, where we can define employee as class which can hold employee number, address fields, and again define salary details as other class and add employee->employee number where key connect between to class which is called derived class.

5 0
3 years ago
Doe's anyone know how to access developer mode on a Chromebook laptop if enterprise enrollment blocks it?
Mekhanik [1.2K]
♥ <span>Boot your Chromebook into recovery Mode
(Escape refresh and power keys all need to be help down)
It </span><span>will then  reboot into recovery mode
♥ </span><span>Press Ctrl+D at the recovery screen
♥ </span><span>To turn the Verification off you will need to press the enter button.
♥ and then you have it :D 

</span>
8 0
3 years ago
Read 2 more answers
For Internet Protocol (IP) v6 traffic to travel on an IP v4 network, which two technologies are used
qaws [65]

Answer:

These technologies are: Dual Stack Routers, Tunneling, and NAT Protocol Translation.

Explanation:

Dual Stack Routers -  This is the process in which a router’s interface is attached with IPv4 and IPv6 addresses

Tunneling -Tunneling is used as a medium to help the different IP versions  communicate with the transit network.

NAT Protocol Translation -  This helps the IPv4 and IPv6 networks communicate with each other since they do not understand the IP addresses of each other since, they are different IP versions.

3 0
3 years ago
Other questions:
  • The system administrator in your office quits unexpectedly in the middle of the day. It's quickly apparent that he changed the s
    10·1 answer
  • What privacy issues have arisen with webcams in mobile devices?
    8·1 answer
  • ____ is another term for document properties.
    12·1 answer
  • What should you rely on to determine when to change your oil? a. Oil color b. 6,000 miles since the last oil change c. Owners ma
    7·1 answer
  • . Write a short program that asks the user to input a string, and then outputs the
    15·1 answer
  • How do you check how much space is left in current drive?
    9·1 answer
  • A range check that can be used in Microsoft access to calculate the data collected which is date and time
    10·1 answer
  • There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side,
    15·1 answer
  • photoshop Curves, photoshop an image and manipulate the curves on a selection of the photo. upload the original photo and The ph
    5·2 answers
  • Why does brainly want me to PAY or watch ads<br> i hate doing that
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!