1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex787 [66]
3 years ago
5

Pleaseee helpppppppppp

Computers and Technology
1 answer:
zloy xaker [14]3 years ago
5 0

Answer:

EXAMPLE -

Create a variable and assign your age

var myage = 32;

type your age:

console.log(my age) ;

Notice that we did not type the actual numeric age. We used the variable instead. There wouldn’t be any purpose of declaring a variable if we were going to type 32 directly.

This makes the scrip more portable which means that the result on the screen is independent of the code console.log(myAge); . If we need to change our age all we have to do is to assign another number to the variable myAge and the output will change automatically. That’s the purpose of a variable.

You might be interested in
Consider the eight bit signed binary number 1110 0101. Convert it to signed decimal from assuming the signed binary number is re
alukav5142 [94]

Answer:    -26

Explanation:

We have:  1 1 1 0   0 1 0 1

Since it’s one’s complement representation, then we check the very first digit to state if the number is negative or positive. Since the very first digit to the left is 1, then the number will be negative.

When it is negative, we now flip the bits, so that we get:

0 0 0 1   1 0 1 0

Notice we just turn the 1’s into 0’s and vice versa.

We now convert this binary into decimal:

We assign to each digit the corresponding power of 2.  

See it in a table:

\begin{matrix}0&0&0&1&1&0&1&0\\2^7&2^6&2^5&2^4&2^3&2^2&2^1&2^0 \end{matrix}

Then multiplying each digit by its corresponding power of 2 and then adding the results, we get:

2^4+2^3+2^1

We get:

16+8+2=26

Since we stated that the number is negative, then, the final result is: -26

4 0
3 years ago
What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network res
Citrus2011 [14]

Answer:

"Direct access" is the correct answer for the above question .

Explanation:

  • Direct access is a feature available in the window server of the 2016 version. It is used to allow access to the computer system program and the internet remotely behaves like that computer or network is his computer or network.
  • It allows remote users to do anything with the help of an internet connection. But it can be done with the authorization of valid users.
  • The above question states about the features which grant to access the internet for the remote users and this is available in window server 2016. This feature is known as "Direct access".
7 0
4 years ago
चार फरक छुट्याउनुहोस् ।) 3. Write down any four provisions of cyber ethic साइबर नैतिकताका कुनै चार प्रावधानहरु लेख्नुहोस् ।​
Kruka [31]

Answer:

Five provisions of cyber ethics are:

Your computer or system should not be used to harm others. Your cyber knowledge should not be used to steal other people's resources. One should not use or copy softwares for which you have not paid. ... Never use other people's resources without their consent.

7 0
3 years ago
2. It is the art of creating computer graphics or images in art, print media, video games.
vfiekz [6]
The answer is CGI :)
4 0
3 years ago
What is programming blocks?
charle [14.2K]

Answer:

In computer programming, a block or code block is a lexical structure of source code which is grouped togethe

Explanation:

3 0
3 years ago
Other questions:
  • Email applications can either be local email client programs or web-based applications. Which application is an example of a loc
    13·2 answers
  • A quick boot allows you to do what?
    7·2 answers
  • What is a premium?
    14·2 answers
  • A customer has a computer for a home business, but wants to have another computer as a web server. What would be the best soluti
    11·2 answers
  • What is the range of addresses for conditional branches in MIPS (K = 1024)?
    6·1 answer
  • SXXSSSSSSSSSZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
    14·1 answer
  • What is the most used piece of technology in education?
    13·1 answer
  • OTATAYAYYAYYA HAVE A NICE DAY BEAUTIFUL PEOEOEPOPEPELELELEEL
    5·2 answers
  • What are 3 software programs for mobile computing?
    10·1 answer
  • A data table is a range that displays what?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!