1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
2 years ago
6

Which lines of the code, marked by Q, are legally declared based on the scope of the variable?​

Computers and Technology
1 answer:
WINSTONCH [101]2 years ago
4 0

inside a function or a block which is called local variables

You might be interested in
The security manager assigned a new security administrator the task of implementing secure protocols on all wireless access poin
Marysya12 [62]

Answer:

Good choice, as its one of the most secure wireless communications encryption methods, even though WPA2 would be the best

Explanation:

8 0
3 years ago
If an individual receives 1.8 mGy while standing 4 ft from a source of radiation for 2 minutes, which of the following option(s)
erastovalidia [21]

Answer:

The answer is letter B.

Explanation:

The option that will most effectively reduce her or his radiation exposure to that source is Standing 8 ft from the source for 2 minutes.

6 0
3 years ago
Why isn't my brainly camera working? I got Brainly Plus and can't even scan questions. I've logged out, I've uninstalled and rei
N76 [4]

Answer:

Try resetting your device.

Explanation:

In order to send and receive iMessages to your iPhone, iMessage must be enabled. By doing this, you will associate your phone number with the email address used for your Apple ID or iCloud account.

8 0
3 years ago
How many possible password of length four to eight symbols can be formed using English alphabets both upper and lower case (A-Z
Fynjy0 [20]

Answer:

In a password, symbol/characters can be repeated. first calculate the total

symbols which can be used in a password.

So there are total 26(A-Z),26(a-z),10(0-9) and 2(_,$) symbols.

that is equal to 26+26+10+2=64.

Total number of password of length 4:

here at each place can filled in total number of symbols i.e 64 way for each

place.Then total number of possible password is:

64*64*64*64=16777216

Total number of password of length 5:

here at each place can filled in total number of symbols i.e 64 way for each

place.Then total number of possible password is:

64*64*64*64*64=1073741824

Similarly,

Total number of password of length 6:

64*64*64*64*64*64=68719476736

Total number of password of length 7:

64*64*64*64*64*64*64=4398046511104

Total number of password of length 8:

64*64*64*64*64*64*64=281474976710656

Hence the total number of password possible is:285,942,833,217,536

7 0
3 years ago
The GaVS resource where students can locate information regarding Canvas, student email, registration and O365 is called the: St
wariber [46]

I Inferred you are referring to the Georgia Virtual School resource program.

<u>Answer:</u>

<u>Guidance Center</u>

<u>Explanation:</u>

Interestingly, the Georgia Virtual School (GaVS) enables students access to Virtual education.

Their resource platform allows students to find information regarding Canvas, student email, registration and Office 365 etc by simply going Guidance Center.

7 0
3 years ago
Other questions:
  • Given half a chance other people at work will take advantage of you
    11·1 answer
  • Write a function called lucky_sevens that takes in one #parameter, a string variable named a_string. Your function #should retur
    15·1 answer
  • How many bits would be needed to count all of the students in class today there is 20 students
    6·1 answer
  • The greatest common divisor of integers x and y is the largest integer that evenly divides into both x and y. Write a recursive
    7·1 answer
  • Renae wants to write a blog about her favorite sports stars. She wants the blog to be informative and visually appealing, so she
    13·2 answers
  • Which information purpose uses video from a security camera?
    15·1 answer
  • The right to make others do things is referred to as _________.
    14·2 answers
  • a term to describe article that can be displayed in their entirety as opposed to abstract and reference only?​
    10·1 answer
  • The Electronic Age began in the<br> A. 1940s<br> B. 1970s<br> C. 1980s<br> D. 1990s
    11·2 answers
  • Database accessibility DBA writes subschema to decide the accessibility of database.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!