1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zalisa [80]
3 years ago
15

Sidney needs to create a decimal number variable that will be added to another number. What kind of variable is required?binaryB

ooleanstringfloat
Computers and Technology
1 answer:
stepladder [879]3 years ago
8 0
Answer:

Option D. float is the correct answer.

Explanation:
Decimal number contains decimal point. Out of all the given data types, float data type store the number with decimal point.
As the number has to be further used for calculations float ahs to be used. Because the numbers can also be stored in string but cannot be used for further calculations.
You might be interested in
A thin red border indicates the active cell. (True or False)
sergij07 [2.7K]
<span>It is false that a thin red border indicates the active cell. As a matter of fact, an active cell is indicated by a thin green border. That means that you have clicked that particular cell, and that it is activated, so that you can use it and write whatever you want there. Usually, even in the real world, green means that something is active, and red that it is inactive.</span>
3 0
3 years ago
A virus has attacked your hard drive and now when you start up Windows, instead of seeing a Windows desktop, the system freezes
vitfil [10]

Answer:

The user needs to remove the hard drive and put the hard drive onto the other computer which have already any operating system and antivirus also.

Explanation:

  • This gives the facility to extract the information on the other computer.
  • Then the user needs to extract the information and files into some hard drive after scanned the files.
  • Then the user needs to format the hard drive of the first computer and install the other operating system on it.
  • Then the user needs to put any antivirus on his first computer.
  • Then the user needs to put the file on the first computer

The above-described steps need to taken for that user if he has the scenario which the above question said. The first steps are to remove the hard drive because the user can not able to read or scan files on that computer so there is a need to transfer the hard disk on the other computer to read and scan files.

4 0
4 years ago
Read 2 more answers
Whose massively popular photo led to the creation of google images?
Alex
Jennifer Lopez’s picture led to the creation of google images.
5 0
4 years ago
You have been employed as a technical consultant to a computer shop chain. You are given the task of creating a short consumer b
brilliants [131]

Answer:

The five factors to consider when trying to choose between a Solid State Drive, a Hard Disk Drive and, an External Hard Disk Drive are:

  1. Read/Write Speed
  2. Weight
  3. Power Consumption
  4. Cost
  5. Storage Capacity

  • Solid State Drives (SSDs) are typically lighter in weight, faster and do not consume much power.
  • Hard Disk Drives are relatively cheaper than SSDs. They also come with higher storage capacities but are more power-hungry and slower because they rely on mechanical/moving parts to read and write data.
  • External HDDs are the cheapest of the three. They are not internal which is a major drawback given the additional weight. However, they come with gargantuan storage capacities that make you want to rethink having one. Besides, unlike SSDs, you can easily get them in computer accessories shops offline or online.

Cheers!

3 0
4 years ago
Choose the term that best matches the definition.
Y_Kistochka [10]

Answer: it’s network protocol

Explanation:

4 0
3 years ago
Other questions:
  • Which statement is true about the elements of the interface of a presentation program? The status bar appears at the top of the
    14·2 answers
  • Hi I am Khine Mye and I want to ask you a question I don't know that is square root of 2 is 1.4 and how to get that 1.4 and plz
    8·1 answer
  • The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
    7·1 answer
  • Kevin manages the security for his company and is working to implement a kernel integrity subsystem for key servers. Of the foll
    9·1 answer
  • Managers looking for advice on properly dealing with obsolete technology hardware can: a) consult the e-Stewards program b) seek
    9·1 answer
  • What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively? answer
    13·1 answer
  • The 7-bit ASCII code for the character ‘&amp;’ is: 0100110 An odd parity check bit is now added to this code so 8 bits are trans
    12·1 answer
  • A computer virus is a program that can copy itself and infect a computer without the permission of the owner. How do you think a
    9·1 answer
  • In this lab you will learn about the concept of Normal Forms for refining your database design. You will then apply the normaliz
    15·1 answer
  • A human subject’s photographs show two catchlights in each eye that are unwanted by the photographer. What is the most likely ca
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!