1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmasim [6.3K]
2 years ago
9

What’s the difference between var and val?

Computers and Technology
1 answer:
fiasKO [112]2 years ago
7 0

Answer:

<em> </em><em>Answer </em><em>in </em><em>the </em><em>below </em><em>{</em><em>plz </em><em>mark </em><em>me </em><em>as </em><em>brainlist</em><em>:</em><em>)</em><em>}</em>

Explanation:

The difference between val and var is that val makes a variable immutable — like final in Java — and var makes a variable mutable. Because val fields can't vary, some people refer to them as values rather than variables.

You might be interested in
Refer to the exhibit, a technician applies the configuration in the exhibit to an unconfigured router. To verify the configurati
pentagon [3]

Answer:

E. Enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0 enable password 7 14141E0A1F17 line console 0 password 7 020507550A

Explanation:

The cisco ios is the operating system of any cisci network device. It is a command line interface used to configure these cisco devices.

The privilege user command "show running-config" in the command line interface is used to show the current configuration on the RAM of the router.

There are two ways to protect the router's console line with a password, with enable secret and enble password. The "enable secret" is a slightly encrypted password but the "enable password" has no encryption. These password methods are used to secure any channel to the router.

The "service password-encryption" command is used to encrypt all the passwords in the current configuration, to prevent attackers or unauthorized users from getting to the router.

7 0
4 years ago
Fuction table of JK-Flip flop?
vivado [14]

Answer:

Explanation:

The Truth Table for the JK Function. Then the JK flip-flop is basically an SR flip flop with feedback which enables only one of its two input terminals, either SET or RESET to be active at any one time thereby eliminating the invalid condition seen previously in the SR flip flop circuit.

6 0
3 years ago
ASAP: Type the correct answer in the box. Spell all words correctly.
DerKrebs [107]

Answer:

has?

Explanation:

i think i need a few more details then we can talk

4 0
3 years ago
Write a for loop that displays the following set of numbers: 0,10,20,30,40,50....1000
ELEN [110]
C# program code:

int i = 0
while (i<=1000)
{
console.Writeline("{0}",i);
i = i + 10;
}

Explanation:
First we set variable to initial value. In this example it is 0. Then we enter into while loop. This type of loop executes the code until the condition is fulfilled. In our case while loop checks if i <=1000. It is and then it writes it on the screen. Next step is to increase it by 10. Then it does the same code again.
Last number that will be printed is 1000. After that it will increase i to 1010 and it will exit the loop.
3 0
3 years ago
A _____ is an area hosted by a Web server in which project members and colleagues can share documents, models, photos, and other
pshichka [43]

Answer: Shared work-space

Explanation:

Shared work-space is one of the area that are technically hosted by the web server where all the member of the project ad also colleagues in the office can sharing the various types of documents, photos and information about the topics of status of the given project and based on the common interest.    

A shared work-space is the type of virtual and physical work space environment where the organization or company employees worked together and shared lots of information.  

 

 

4 0
3 years ago
Other questions:
  • Controls that are used to assess whether anything went wrong, such as unauthorized access attempts, are called ________ controls
    5·2 answers
  • Where is the bios in the soft ware or hard ware
    13·2 answers
  • Both k-means and k-medoids algorithms can perform effective clustering. (a)Explain the strength and weakness of k-means in compa
    5·1 answer
  • Write a declaration for a class named City, which has the members cityName, a string, and position, a Location structure (declar
    10·1 answer
  • Who where the romanovs? What happened to them ?
    7·1 answer
  • Which entity has the principal responsibility to control the execution of processes?
    14·1 answer
  • What is the main purpose of dtp software?
    10·1 answer
  • Your manager has asked you to write a program that displays the percentage of males and female in your class. The program should
    7·1 answer
  • The intelligence displayed by humans and other animals is termed?
    15·1 answer
  • You can use _____ to track the state of each user in the application.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!