Answer: $80
Explanation:
Kyoko's willingness to pay for an iPhone is $350 if she buys it for $150, $300 if she buys it on sale for $100, and $400 if the price is $400 (and no consumer surplus exists at this price).
Consumer surplus is the difference between the price a consumer is willing to pay for a product and the actual price they pay. To find Kyoko's willingness to pay for an iPhone, we add the consumer surplus to the actual price.
Kyoko buys an iPhone for $150 and gets a consumer surplus of $200.
Willingness to pay = Actual price + Consumer surplus
Willingness to pay = $150 + $200 = $350
If she had bought the iPhone on sale for $100, her consumer surplus would have been $200.
Willingness to pay = Actual price + Consumer surplus
Willingness to pay = $100 + $200 = $300
If the price of the iPhone had been $400, her consumer surplus would have been $0.
Willingness to pay = Actual price + Consumer surplus
Willingness to pay = $400 + $0 = $400
To learn more about the consumer surplus;
https://brainly.com/question/29025001
#SPJ3
Electronic payment system is a——–.
a. An informal report.
b. Not having legal sanction.
c. Always a statistical report.
d. Formal report.
\(\huge \mathcal \fcolorbox{cyan}{black}{ \blue{AnSweR}}\)
Electronic payment system is a Formal report.What are some ways to find out what skills you need to develop at work? Check all of the boxes that apply.
Ask a supervisor’s opinion.
Ask coworkers’ opinions.
Observe what people who have easy jobs are doing.
Attend trainings offered by the company.
Answer:
Attend traings
Explanation:
Because if you do you can learn diffent waay to do it and choose your way that you like.
ANd do not obseve poeple who has it easy
the answers are:
- ask a supervisor’s opinion
- ask coworkers’ opinions
- attend trainings offered by the company
01:29:21
Which guidelines should we follow to ensure that we create, consume, and share information responsibly? Select
3 options.
Assess the original sources of the material to determine whether they are credible
Recognize how language and news conventions can be exploited to manipulate us.
Check the facts to verify material before you create, believe, and/or share material.
The internet is there to read and learn, not to question its authenticity.
Leave the information as is because you do not have the authority to question it.
The three options to ensure responsible creation, consumption, and sharing of information:
Assess the original sources of the material to determine whether they are credible.Recognize how language and news conventions can be exploited to manipulate us.Check the facts to verify material before you create, believe, and/or share material.How is this done?It is important to evaluate the reliability of primary sources in order to promote responsible production, consumption, and distribution of information. To ensure accuracy, it is necessary to assess the credibility and proficiency of the sources.
It is important to have an awareness of how language and news conventions can be altered deliberately, in order to avoid being deceived or influenced by partial and biased information.
Ensuring the precision of content is imperative before generating, accepting, or dispersing it, and therefore, fact-checking is an essential procedure to undertake. By adhering to these instructions, we can encourage conscientious handling of information and hinder the dissemination of false information
Read more about information sharing here:
https://brainly.com/question/27960093
#SPJ1
WHICH OF THE FOLLOWING TASKS ARE PART OF THE SOFTWARE EVALUATION PROCESS?
TESTERS...
With regard to software evaulation, note that the correct options are -
Testers check that the code is implemented according to the specification document.A specification document is created.Any issues with the software are logged as bugs.Bugs are resolved by developers.How is this so?The tasks that are part of the software evaluation process include -
Testers check that the code is implemented according to the specification document.A specification document is created.Any issues with the software are logged as bugs.Bugs are resolved by developers.Tasks not directly related to the software evaluation process are -
Software developers writing code line by line.Creating a design for the software program.Learn more about software evaluation at:
https://brainly.com/question/28271917
#SPJ1
Full Question:
Although part of your question is missing, you might be referring to this full question:
Choose all that apply: Which of the following tasks are part of the software evaluation process?
testers check that the code is implemented according to the specification document
an specification document is created
software developers write code line by line
any issues with the software are logged as bugs
bugs are resolved by developers
a design for the software program is created
You are asked to check for undocumented features of the Computer Program. Outline the strategy you would use to identify and characterize unpublicized operations.
The following is a general strategy to identify and characterize unpublicized operations in a computer program:
Identify potential areas of the program where undocumented features might exist. This could include any parts of the program that have been customized, or any features that seem to work differently from the documented behavior.
Use testing tools to examine the program's behavior and identify any differences from the documented behavior. This could include debugging tools, testing frameworks, or custom scripts that simulate program inputs.
Analyze the program's source code to identify any unusual or suspicious behavior. This could include reviewing the program's libraries and dependencies, examining code for hidden or obfuscated functions, or searching for specific keywords or patterns.
Conduct interviews with program developers, testers, or other staff to identify any undocumented features or behavior. This could include asking about any known workarounds or hacks, or querying staff about any unusual or unexpected behaviors they have observed.
Collaborate with other security researchers to share information about any potential undocumented features or behavior. This could include participating in online forums, attending conferences, or sharing information through social media.
Document any findings in detail, including any discovered functionality, how it is accessed, and any potential security implications. This information can be used to develop mitigation strategies or to communicate with program developers and other stakeholders.
Considering the following part of the database to keep track of students and their marks for the courses that they follow.
Student(sid, sname, year)
Registered(sid, cid, mark, grade)
Course(cid, cname, no_credit, deptid)
Which of the following sequence of operations would list the names of students who have not registered for any course?
To list the names of students who have not registered for any course, we can use the following sequence of operations:
Retrieve all student IDs (sid) from the Student table.Retrieve all student IDs (sid) from the Registered table.Perform a LEFT JOIN between the two sets of student IDs, filtering out the matching records.Retrieve the names (sname) of the students from the resulting set.How can we list the names of students who have not registered for any course?To obtain the names of students who have not registered for any course, we need to compare the student IDs between the Student and Registered tables.
By performing a LEFT JOIN and filtering out the matching records, we will be left with the students who have not registered for any course. Finally, we can retrieve their names from the resulting set to list them.
Read more about sequence of operations
brainly.com/question/550188
#SPJ1
Do you think privacy policies are effective in social networking sites?
Answer:
When that information gets posted online, it is no longer private, and may end up falling into wrong hands. Even if you have put in place the highest possible security measures, some of your friends, colleagues and companies you interact with on social media, can end up leaking your personal information.
In my opinion, privacy policies are less effective in social networking sites When that fact receives published online, it's far now not private, and can become falling into incorrect hands.
What is the privacy in networking sites?Privacy and safety settings exist for a reason: Learn approximately and use the privateness and safety settings on social networks. They are there that will help you manipulate who sees what you put up and control your online revel in in a fine way.
Even when you have installed location the best viable safety measures, a number of your friends, colleagues and businesses you engage with on social media, can become leaking your private facts.
Read more about the social networking:
https://brainly.com/question/3653791
#SPJ2
Solve recurrence relation x (n) = x(n/3) +1 for n >1,x(1) =1. (Solve for n = 3k)
To solve this recurrence relation, we can use the iterative method known as substitution method. First, we make a guess for the solution and then prove it by mathematical induction.
Let's guess that x(n) = log base 3 of n. We can verify this guess by induction:
Base Case: x(1) = log base 3 of 1 = 0 + 1 = 1. So, the guess holds for n = 1.
Induction Hypothesis: Assume that x(k) = log base 3 of k holds for all k < n.
Induction Step: We need to show that x(n) = log base 3 of n holds as well. We have:
x(n) = x(n/3) + 1
= log base 3 of (n/3) + 1 (by induction hypothesis)
= log base 3 of n - log base 3 of 3 + 1
= log base 3 of n
So, x(n) = log base 3 of n holds for all n that are powers of 3.
Therefore, the solution to the recurrence relation x(n) = x(n/3) + 1 for n > 1, x(1) = 1, is x(n) = log base 3 of n for n = 3^k.
1. Create a function called numberGuess. Function numberGuess will first choose a random number in the range 1 to 1000. The number that is chosen is what the user is supposed to guess. Following this, your function should then display the following
The player then types a first guess. The function responds with one of the following:
Your function must not stop asking for guesses until the user has provided a correct solution. Your program should keep telling the player Too high or Too low to help them narrow down the answer. Count the number of guesses the player makes. At the end when the user finally guesses correctly, print Either you know the secret or you got lucky! if the number of guesses were 10 or less. If the player guesses the number in 10 tries, then print Ahah! You know the secret! If the player makes more than 10 guesses, then print You should be able to do better!
-
- I already have some code however not sure if its 100% correct
Please review feedback will appreciated, thanks
#include
using namespace std;
int main()
{
int num, guess, tries = 0;
srand(time(0)); //seed random number generator
num = rand() % 1000 + 1; // random number between 1 and 1000
cout << "I have a number between 1 and 1000"< > guess;
tries++;
if (guess > num)
cout << "Too high!\n\n";
}
while(guess < num);
cout << "Too low!\n\n";
if(10<=guess)
cout << "\nCorrect!either you know the secret or you got lucky" << tries << " guesses!" <
{
} if (guess==10){
cout<<" Ahah! You know the secret!"<
}
else
{
cout<< "You should be able to do better! ";
cout<< " Would you like to play again? (Y/N)";
}
}
You can edit this code whatever you want! Good luck.
How is this possible? What is the explaination
Answer:
Nothing is possible
Explanation:
I am kidding
/* Program Name: CollegeAdmission.cpp
Function: This program determines if a student will be admitted or rejected.
Input: Interactive
Output: Accept or Reject
Answer:
Here's an example C++ code for the program described:
#include <iostream>
#include <iostream>using namespace std;
#include <iostream>using namespace std;int main() {
#include <iostream>using namespace std;int main() { int gpa;
#include <iostream>using namespace std;int main() { int gpa; int admissionTestScore;
#include <iostream>using namespace std;int main() { int gpa; int admissionTestScore; // Get user input
#include <iostream>using namespace std;int main() { int gpa; int admissionTestScore; // Get user input cout << "Enter your GPA: ";
#include <iostream>using namespace std;int main() { int gpa; int admissionTestScore; // Get user input cout << "Enter your GPA: "; cin >> gpa;
#include <iostream>using namespace std;int main() { int gpa; int admissionTestScore; // Get user input cout << "Enter your GPA: "; cin >> gpa; cout << "Enter your admission test score: ";
#include <iostream>using namespace std;int main() { int gpa; int admissionTestScore; // Get user input cout << "Enter your GPA: "; cin >> gpa; cout << "Enter your admission test score: "; cin >> admissionTestScore;
#include <iostream>using namespace std;int main() { int gpa; int admissionTestScore; // Get user input cout << "Enter your GPA: "; cin >> gpa; cout << "Enter your admission test score: "; cin >> admissionTestScore; // Determine admission status
#include <iostream>using namespace std;int main() { int gpa; int admissionTestScore; // Get user input cout << "Enter your GPA: "; cin >> gpa; cout << "Enter your admission test score: "; cin >> admissionTestScore; // Determine admission status if (gpa >= 3 && admissionTestScore >= 60) {
#include <iostream>using namespace std;int main() { int gpa; int admissionTestScore; // Get user input cout << "Enter your GPA: "; cin >> gpa; cout << "Enter your admission test score: "; cin >> admissionTestScore; // Determine admission status if (gpa >= 3 && admissionTestScore >= 60) { cout << "Congratulations! You have been accepted." << endl;
#include <iostream>using namespace std;int main() { int gpa; int admissionTestScore; // Get user input cout << "Enter your GPA: "; cin >> gpa; cout << "Enter your admission test score: "; cin >> admissionTestScore; // Determine admission status if (gpa >= 3 && admissionTestScore >= 60) { cout << "Congratulations! You have been accepted." << endl; } else {
#include <iostream>using namespace std;int main() { int gpa; int admissionTestScore; // Get user input cout << "Enter your GPA: "; cin >> gpa; cout << "Enter your admission test score: "; cin >> admissionTestScore; // Determine admission status if (gpa >= 3 && admissionTestScore >= 60) { cout << "Congratulations! You have been accepted." << endl; } else { cout << "Sorry, you have been rejected." << endl;
#include <iostream>using namespace std;int main() { int gpa; int admissionTestScore; // Get user input cout << "Enter your GPA: "; cin >> gpa; cout << "Enter your admission test score: "; cin >> admissionTestScore; // Determine admission status if (gpa >= 3 && admissionTestScore >= 60) { cout << "Congratulations! You have been accepted." << endl; } else { cout << "Sorry, you have been rejected." << endl; }
#include <iostream>using namespace std;int main() { int gpa; int admissionTestScore; // Get user input cout << "Enter your GPA: "; cin >> gpa; cout << "Enter your admission test score: "; cin >> admissionTestScore; // Determine admission status if (gpa >= 3 && admissionTestScore >= 60) { cout << "Congratulations! You have been accepted." << endl; } else { cout << "Sorry, you have been rejected." << endl; } return 0;
#include <iostream>using namespace std;int main() { int gpa; int admissionTestScore; // Get user input cout << "Enter your GPA: "; cin >> gpa; cout << "Enter your admission test score: "; cin >> admissionTestScore; // Determine admission status if (gpa >= 3 && admissionTestScore >= 60) { cout << "Congratulations! You have been accepted." << endl; } else { cout << "Sorry, you have been rejected." << endl; } return 0;}
Explanation:
In this program, we first declare two integer variables gpa and admissionTestScore to hold the user input. We then use cout to display prompts to the user to enter their GPA and admission test score, respectively. We use cin to read in the user input.
We then use an if statement to determine if the user is accepted or rejected based on their GPA and admission test score. In this example, we use the criteria that a GPA of 3 or higher and an admission test score of 60 or higher are required for acceptance.
If the user meets the acceptance criteria, we use cout to display the message "Congratulations! You have been accepted." on a new line. Otherwise, we display the message "Sorry, you have been rejected." on a new line.
Finally, we use return 0; to indicate that the program has completed successfully.
The _____ Tag surrounds all content that will be visible on your web page for all to users to see on that website.
Answer:
The body tag
Explanation:
HTML has several tags; however, the tag that handles the description in the question is the body tag.
It starts with the opening tag <body> and ends with closing tag </body>
i.e.
<body>
[Website content goes in here]
</body>
Any text, image, object etc. placed within this tag will be displayed in the website
I am in class 7 should I go with java or python.
Answer:python
Explanation:
it’s a good coding program
Write a program that declares and initializes a variable representing the weight in milligrams from the keyboard. The program displays the equivalent weight in kilograms, grams, and milligrams. For example, 1050042 milligrams are equivalent to 1 kilogram, 50 grams, and 42 milligrams.
Answer:
weight = int(input("Enter weight in milligrams: "))
kilograms = int(weight / 1000000)
grams = int((weight - (kilograms * 1000000)) / 1000)
milligrams = weight - ((kilograms * 1000000) + (grams * 1000))
print("{} milligrams are equivalent to {} kilogram(s), {} gram(s), and {} milligram(s)".format(weight, kilograms, grams, milligrams))
Explanation:
*The code is in Python.
Ask the user to enter the weight and set it to the variable weight
Calculate the kilograms, divide the weight by 1000000 and cast the result to the int (If the weight is 1050042, kilograms would be 1050042/1000000 = 1)
Calculate the grams, subtract the kilograms from the weight, divide it by 1000 and cast the result to the int (If the weight is 1050042, grams would be int((1050042 - (1 * 1000000)) / 1000) = 50)
Calculate the milligrams, subtract the kilograms and grams from the weight (If the weight is 1050042, milligrams would be 1050042 - ((1 * 1000000) + (50 * 1000)) = 42)
Print the weight, kilograms, grams, and milligrams in the required format
In this exercise we have to use the knowledge of the python language to write the code, so we have to:
The code is in the attached photo.
Some important information informed in the statement that we have to use in the code is:
Calculate the kilograms, divide the weight by 1000000 and cast the result.Calculate the grams, subtract the kilograms from the weight, divide it by 1000 and cast the result.Calculate the milligrams, subtract the kilograms and grams from the weight.So to make it easier the code can be found at:
weight = int(input("Enter weight in milligrams: "))
kilograms = int(weight / 1000000)
grams = int((weight - (kilograms * 1000000)) / 1000)
milligrams = weight - ((kilograms * 1000000) + (grams * 1000))
print("{} milligrams are equivalent to {} kilogram(s), {} gram(s), and {} milligram(s)".format(weight, kilograms, grams, milligrams))
See more about python at brainly.com/question/26104476
Which option identifies the type of engineers described in the following scenario?
A team of engineers in Gaylord, Michigan, designs a system to remove natural gas from the earth.
O biomedical
O mechanical
O agricultural
O civil
Answer:
a civil
Explanation:
did it and got 100
How did the cyber attack affect other industries aside from the energy grid
Answer:
Explanation:
Cyber attacks can have a wide-ranging impact on various industries beyond the energy grid, depending on the nature and severity of the attack. Some examples of industries that may be affected include:
1) Financial services: Cyber attacks on financial institutions, such as banks or credit card companies, can result in the theft of customer information or financial data. This can cause a loss of trust and damage the reputation of the affected institution, as well as lead to financial losses for both the institution and its customers.
2) Healthcare: Cyber attacks on healthcare organizations can compromise sensitive patient data, such as medical histories or personal information. This can not only violate the privacy of patients but can also endanger their health if critical medical data is lost or altered.
3) Transportation: Cyber attacks on transportation systems, such as airlines or public transportation, can cause significant disruptions to travel schedules or lead to safety risks for passengers.
4) Retail: Cyber attacks on retail companies can result in the loss of customer data, such as credit card information or personal details. This can harm the reputation of the affected company and damage customer trust, leading to decreased sales and revenue.
5) Government: Cyber attacks on government organizations can compromise sensitive information, such as classified data or government secrets. This can result in a breach of national security and compromise the safety of citizens.
Overall, cyber attacks can have a significant impact on many different industries, highlighting the importance of effective cybersecurity measures to protect against such attacks.
You just figured out the root cause of an application error. You changed some configurations on the affected machines and verified that the users have full functionality. What should you do next?
After resolving the application error and verifying that users have full functionality,the next step is to document the changes made and the steps taken to resolve the issue.
How is this so?This documentation is crucial for future reference, troubleshooting, and knowledge sharing within the team.
Also, it is important tocommunicate the resolution to the relevant stakeholders,such as users or supervisors, to ensure they are aware of the resolution and can provide f eedback if necessary.
Learn more about application error at:
https://brainly.com/question/30062195
#SPJ1
One tool of Lean that is a container, card, or visual limit that signals when work needs to be done or replenishment needs to be initiated is called a:
Answer:
Kanban System
Explanation:
Kanban can be regarded as one of Lean tools which is been designed to carry out reduction of the idle time in a production process. The idea or concept behind this Kanban system, is to make delivery of needs of the process needs at exactly the it needs it. Kanban can be reffered to as visual cards. Kanban can as well be explained as scheduling system that is used for lean manufacturing as well as just-in-time manufacturing. Taiichi Ohno, who was an industrial engineer at Toyota carried out development of kanban so that there could be an improved manufacturing efficiency. Kanban is considered as one method used to achieve JIT.
It should be noted that Kanban System is One tool of Lean that is a container, card, or visual limit that signals when work needs to be done or replenishment needs to be initiated .
A container, card, or visual limit that signals when work needs to be done or replenishment needs to be initiated is called a Kanban system.
Kanban is gotten from a Japanese word meaning 'signboard' but it has been used recently as a means of scheduling.
The Kanban system is a method of using cards or visual signals for triggering or controlling the flow of materials when work needs to be done. It is useful because it makes work processes more efficient.
A container, card, or visual limit that signals when work needs to be done or replenishment needs to be initiated is called a Kanban system.
Find out more at: https://brainly.com/question/22616012
what is a client server network and its features?
Answer:
A client-server network is the medium through which clients access resources and services from a central computer, via either a local area network (LAN) or a wide-area network (WAN), such as the Internet. ... A major advantage of the client-server network is the central management of applications and data.
the pane of the site setup dialog box defines the settings you need to upload site files through dreamweaver files panel.
The Site Setup dialog box in Adobe Dreamweaver is used to define the parameters of a website.
What is Site Setup?Site Setup is the process of configuring a website for hosting on a web server. This includes setting up the domain name, setting up the web server, configuring the web server for the specific website, and setting up the server software. This process also includes setting up the database and configuring the security for the website. It may also involve setting up email accounts, setting up the FTP access, and setting up the website content. Site Setup is an important step in setting up a website and should be done properly to ensure the website is able to run properly and securely.
This includes the local and remote locations, which are the folders where files (such as HTML and image files) are stored on your computer and the web server, respectively. In addition, the Site Setup dialog box allows you to set up the connection type (FTP, SFTP, etc.) and credentials (username, password, etc.) you need to upload your site files to the remote server. Once these settings are configured, you can use the Files panel in Dreamweaver to quickly upload and download files to and from the server.
To learn more about website
https://brainly.com/question/28431103
#SPJ4
In Java only please:
4.15 LAB: Mad Lib - loops
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (and hopefully funny) ways.
Write a program that takes a string and an integer as input, and outputs a sentence using the input values as shown in the example below. The program repeats until the input string is quit and disregards the integer input that follows.
Ex: If the input is:
apples 5
shoes 2
quit 0
the output is:
Eating 5 apples a day keeps you happy and healthy.
Eating 2 shoes a day keeps you happy and healthy
Answer:
Explanation:
import java.util.Scanner;
public class MadLibs {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
String word;
int number;
do {
System.out.print("Enter a word: ");
word = input.next();
if (word.equals("quit")) {
break;
}
System.out.print("Enter a number: ");
number = input.nextInt();
System.out.println("Eating " + number + " " + word + " a day keeps you happy and healthy.");
} while (true);
System.out.println("Goodbye!");
}
}
In this program, we use a do-while loop to repeatedly ask the user for a word and a number. The loop continues until the user enters the word "quit". Inside the loop, we read the input values using Scanner and then output the sentence using the input values.
Make sure to save the program with the filename "MadLibs.java" and compile and run it using a Java compiler or IDE.
Which of the following takes place during the research phase
I am unsure if this is the correct question, but I think this is the full question:
Which of the following takes place during the research phase? (choose all that apply)
O software requirements are gathered
O software requirements are implemented in code
O software requirements are analyzed
O software requirements are detailed in a specification document
The answers to this question are software requirements are gathered, software requirements are analyzed, and software requirements are detailed in a specification document (1st, 3rd, and 4th options).
Use Chrome Remote Desktop to create a remote connection to Computer 2. Can you use the utility to view the desktop of Computer 2
Answer:
Yes, this can be done. You'll need a static IP on your desktop, there is a registry entry that controls the port remote desktop listens on. Change the desktop to port 3390 or some other unused port number.
can someone please give me the correct answer to this? 8.7.5 Calendar Codehs.
The calendar Codes is given as follows;
import calendar
# Prompt user for month and year
month = int(input("Enter month (1-12): "))
year = int(input("Enter year: "))
# Display calendar for the given month and year
print(calendar.month(year, month) )
How does this work ?The month ) function from the calendar module takes two arguments: the year and month to display the calendar for.
It returns a formatted string representing the calendar for that month, which is then printed to the console.
A formatted string literal, often known as an f-string, is a string literal that begins with 'f' or 'F' in programming.
Learn more about Codes at:
https://brainly.com/question/3042960
#SPJ1
Stress is an illness not unlike cancer.
True
False
Answer:
... not unlike cancer.
Explanation:
so we have a double negative so it makes it a positive, so that would basically mean like cancer
so false i think
Answer: True
Explanation:
Within the manufacturing industry, there are fourteen subindustries. Which of the
following is one of these subindustries?
A) Shipping and warehousing.
B) Petroleum and coal products.
C) Automobile manufacturing.
D) Concrete and steel.
Answer: A or B i done this before but my memorys quite blurry i rekon doing A
Explanation:
how can a security framework k assist in the deisng and implementation of a secuiry infrastructure what isn information security governance
Answer:
on January 1st the new year begins rewrite and punctuate correctly
As a high school student, what do you think is the advantage of someone who has knowledge about the basics of internet compared to those who have not yet experienced using it?
Answer:
For your future in your career, you will definitely have an upper hand and will be able to access and use more tools. But the person that has never used a computer before does not know what exactly they are missing. When they try to use a computer, they will struggle with simple task that now come naturally to you.
Explanation:
When a message is encrypted in two different experiments, the ciphertext should be different. This is an important requirement for encryption. How do AES-128-CBC and RSA encryptions achieve this property?
A) AES-128-CBC uses different IVs and RSA uses random paddings.
B) AES-128-CBC uses different paddings and RSA uses random paddings.
C) AES-128-CBC uses a given padding and RSA uses a random padding.
d) They both use random paddings.
Answer:
A) AES-128-CBC uses different IVs and RSA uses random paddings.
What are variables? Write the name of any two types of variables.
Answer:
A variable is an identifier which changes the values given to it when the program is being executed.
e.g. - var count : integer
var avg : real
Explanation: