Variables are also known as: a. l values, but can be used as values. b. lvalues, and cannot be used as values c. rvalues, and cannot be used as values. d.Constant variables.

Answers

Answer 1

Variables are also known as:

c. rvalues, and cannot be used as values. rvalue can be a variable, value, constant, operation result or a combination thereof.

About variable in computer programming

In computer programming, a variable or scalar is a storage address (identified by a memory address) paired with an associated symbolic name, which contains a known or unknown amount of information called a value. Variable names are the usual way of referencing the stored value, in addition to referring to the variable itself, depending on the context.

This screening of name and content ensures the name is used independently of the exact information it represents. Identifiers in computer source code can be bound to values during run time, and variable values can thus change during program execution.

Variables are used to store information to be referenced and manipulated in computer programs. They also provide a way of labeling data with descriptive names, so that our programs can be understood more clearly by readers and ourselves.

It's helpful to think of variables as containers that store information. Their sole purpose is to label and store data in memory. This data can then be used throughout your program.

Learn more about variable in computer at https://brainly.com/question/13375207.

#SPJ4


Related Questions

A citizen of any group both

Answers

Answer:

Rights and Responsibilities

Explanation:

1. Human to ____Human____
2. _Human________ to machine
3. Machine to ______Machine
4. _______________ to machine

Answers

Answer:

uhmmm human machine whaT?

Explanation:

Answer:

4 is Machine to machine

Construct a histogram and stats for November - December 2020 and compare this to those from November - December 2021 in a markdown cell below the histogram and statistics. time1 = ... # Seconds since epoch time2 = .. # Seconds since epoch Late2020 = .. Late2020

Answers

Histograms are commonly used in data analysis to visualize the distribution of a dataset.

What is a Histogram?

A histogram is a graphical representation of the distribution of a set of numerical data. It is a bar graph-like structure that displays the frequency of data values within specific intervals, which are called bins or classes.

The height of each bar represents the frequency of data values within that bin.

They allow us to quickly see the shape of the distribution, including the center, spread, and any outliers or gaps in the data.

They are especially useful for large datasets, as they can easily condense a large amount of data into a single, easy-to-understand visual representation.


P.S: Your question is incomplete as you did not provide a set of values, so a general overview about histogram is given above.

Read more about histograms here:

https://brainly.com/question/2962546

#SPJ1

which service is a major commercial cloud platform?
a. Microsoft SQL Services
b. SAP Cloud Services
c. Amazon Web Services
d. Oracle Enterprise Services

Answers

Answer: Amazon Web Service

Explanation:

The service that's a major commercial cloud platform is the Amazon Web Service.

Amazon Web Services offers global cloud based products which include databases, storage, networking, IoT, developer tools, analytics, mobile, develo management tools, security applications etc.

The services are of immense benefit to organizations as they help them in achieving their goals as it helps in lowering IT costs, increase speed, enhance efficiency and revenue.

A(n) is an internal corporate network built using Internet and World Wide Web standards and products.

Answers

An intranet  is an internal corporate network built using Internet and World Wide Web standards and products.

What is the definition of intranet?

This is known to be small or restricted computer network used by a group to communicate with one another is described as an intranet. An intranet is a private computer network that only employees of a specific workplace can access. noun.

The kind of internet utilized privately is an intranet. Since it is a private network, only authorized users can access the intranet. The intranet has a small user base and only offers a little amount of information to its users. various network types

An intranet is a computer network used exclusively by employees of a company for information exchange, improved communication, teamwork tools, operational systems, and other computing services.

Therefore, An intranet  is an internal corporate network built using Internet and World Wide Web standards and products.

Learn more about intranet  from

https://brainly.com/question/13139335
#SPJ1

4.9 Code Practice: Question 4 Edhisive

Write a program that asks the user to enter ten temperatures and then finds the sum. The input temperatures should allow for decimal values.

Sample Run
Enter Temperature: 27.6
Enter Temperature: 29.5
Enter Temperature: 35
Enter Temperature: 45.5
Enter Temperature: 54
Enter Temperature: 64.4
Enter Temperature: 69
Enter Temperature: 68
Enter Temperature: 61.3
Enter Temperature: 50
Sum = 504.3

Answers

i = 0

total = 0

while i < 10:

   temp = float(input("Enter Temperature: "))

   total += temp

   i += 1

print("Sum: {}".format(total))

I wrote my code in python 3.8. I hope this helps!

The program accepts 10 temperature inputs from the user, and takes the sum of the inputs gives before displaying the total sum of the temperature. The program is written in python 3 ;

temp_count = 0

#initialize the number of temperature inputs given by the user and assign to temp_count variable

sum = 0

#initialize the sum of the temperature inputs given

while(temp_count < 10):

#loop allows 10 inputs from the user

values = eval(input('Enter temperature : '))

#prompts user to input temperature values

sum+= values

#adds the inputted values to sum

temp_count+=1

#increases count of input by 1

print('sum of temperature : ', sum)

#displays the total sum

Learn more :https://brainly.com/question/18253379

4.9 Code Practice: Question 4 EdhisiveWrite a program that asks the user to enter ten temperatures and

4.11 lesson practice edhesive

Answers

Hi, you've asked an incomplete question. However, here's the missing part:

Computer___are used to represent a real-world situation using___.

Answer:

software; modeling.

Explanation:

Indeed, Computer software is an important tool used to represent a real-world situation by means of modeling.

For example, computer software can model the rate of transmission of a deadly disease, in other for medical experts to better prepare how to deal with those who may likely fall ill in the future.

The missing phrases in the sentence given describes computer softwares and their use. Hence, the phrases are softwares and modeling.

Computer softwares are apllications or coded programs which are designed to be used on computers to solve a specific problem.

Problems are solved using computer softwares by a concept called modeling. Models refers to skeleton which takes as input, the problem to be solved and produces the required output.

Hence, the missing phrases are softwares and modeling.

Learn more :https://brainly.com/question/14565712

i need help asp

Samar’s team has just started to go through their checklist of game items to see if

it is ready to proceed. What stage of the production cycle is Samar’s team

currently in?


beta

gold

pre-alpha

post-production

Answers

Samar’s team has just started to go through their checklist of game items to see if it is ready to proceed. The stage of the production cycle that Samar’s team is currently in is: "Post Production" (Option D)

What is production Cycle?

The manufacturing cycle includes all actions involved in the transformation of raw materials into final commodities. The cycle is divided into various stages, including product design, insertion into a production plan, manufacturing operations, and a cost accounting feedback loop.

The production cycle of a corporation indicates its capacity to turn assets into earnings, inventory into goods, and supply networks into cash flow. The manufacturing cycle is one component of a larger cycle length that includes order processing time and the cash-to-cash cycle.

It should be mentioned that production is the process of integrating several materials and immaterial inputs (plans, information) to create something for consumption (output). It is the act of producing an output, such as an item or service, that has value and adds to people's utility.

Learn more about production cycle:
https://brainly.com/question/13994503
#SPJ1

html tags are surrounded by which types of brackets​

Answers

Right brackets example

should I transcribe brand names with the capitalization of the first letter to keep your file consistent even if your research shows that the name is officially formatted a different way

Answers

Answer:

wadsadsadaw

Explanation:

dawdsadadadadsadsawdadwada

Answer:

it s17

Explanation:

good morning friends are the best in my life to be in the word

Can someone give me an example of code of any cartoon character using java applet please help me i need to make my project please☹️​

Answers

The Java code for a cartoon character using java applet is

import java.applet.Applet;

import java.awt.*;

public class CartoonCharacter extends Applet implements Runnable {

   Thread t;

   int x = 0;

   int y = 100;

   

   public void init() {

       setSize(500, 500);

       setBackground(Color.white);

   }

   

   public void start() {

       if (t == null) {

           t = new Thread(this);

           t.start();

       }

   }

   

   public void run() {

       while (true) {

           x += 10;

           repaint();

           try {

               Thread.sleep(100);

           } catch (InterruptedException e) {}

       }

   }

   

   public void paint(Graphics g) {

       g.setColor(Color.red);

       g.fillOval(x, y, 50, 50);

   }

}

How does the code work?

Note that the cartoon character is made like a red circle that navigates accross the screent.

The init() method sets the size of the applet and its background color,    while the      start( ) method creates a new thread and starts the animation loop in the run() method

Learn more about Java Code at:

https://brainly.com/question/29897053

#SPJ1

TRUE or FALSE: HTML is used to style web pages.

Answers

Answer:

TRUE

Explanation:

The answer is true hope this helped

At the Network layer, what type of address is used to identify the receiving host?

Answers

Answer:

IP Address

Explanation:

At the Network layer, the IP address is used to identify the receiving host. It identifies the senders and receivers of data in a network.

IP Address is used to assign every node in a network which is used to identify them. Its two main purposes are 1. Address location 2. Identification of network interface.

____must cooperate with each other to neutralize the global threat of information censorship. Select 3 options.
The media
The web brigade
Bot armies
Civil society
The private sector​

Answers

The media must cooperate with each other to neutralize the global threat of information censorship. The correct option is the A.

What is the media?

The media is the group that collect information about the world and then provide it to the public. It is the main medium to get information about what is going on in the world.

Thus, the correct option is A.

Learn more about the media

https://brainly.com/question/21333773

#SPJ1

Answer:

the private sector

civil society

the media

Explanation:

took the test

Design a recursive function that accepts an integer argument, n, and prints the numbers 1

up through n.

Answers

Answer:

Here is the recursive function:

def PrintNumbers(n): #function definition

   if n==1: #base case

       print(n)

   elif n>1: #recursive case

       PrintNumbers(n-1)

       print(n)

   else: #if value of n is less than 1

       print("Invalid input")

Explanation:

Here is the complete program:

def PrintNumbers(n):

   if n==1:

       print(n)

   elif n>1:

       PrintNumbers(n-1)

       print(n)

   else:

       print("Invalid input")        

PrintNumbers(5)

If you want to take input from user then you can use these statements in place of PrintNumbers(5)

num = int(input("Enter value of n: "))

PrintNumbers(num)

I will explain the program with an example:

Lets say value of n = 3

Now the base condition n==1 is checked which is false because n is greater than 1. So the program moves to the recursive part which works as follows:

PrintNumbers(n-1) this line calls PrintNumbers recursively to print numbers from 1 to n=3. So the output is:

1

2

3

The screenshot of program along with its output is attached.

Design a recursive function that accepts an integer argument, n, and prints the numbers 1up through n.

How do you win a game of amoung us

Answers

Answer: As the Crewmates move around the map in Among Us to complete tasks, Impostors try to sabotage and kill them off anonymously. If the latter successfully kills off all the Crewmates without being noticed, then he/she wins the game.

Explanation: Have a blessed day!

Answer: Just go around vent, in secret and press emergency meeting ONE TIME. then say someone vented,  and say they vented but really it was you

Explanation:

:)

Match each number system to set of symbols used to represent numbers in that system.
binary
hexadecimal
Digits
the digits 0 to 9
0 and 1
decimal
the digits 0 to 9 and the letters from A to F
Reset
Next
Number System
>

Match each number system to set of symbols used to represent numbers in that system.binaryhexadecimalDigitsthe

Answers

Answer:

1. The digits 0 to 9 --> decimal

3. 0 and 1 --> binary

2. The digits 0 to 9 and the letters from A to F --> hexadecimal

Write an algorithm and draw a flowchart to enter the length and width of any room then check if length and width are equal find area and circumference of the square room. Otherwise, find the area and circumference of the rectangle room.

Answers

Answer: i have no clue

Explanation:

what is star topology

Answers

every node connects to a central network device. like a hub, switch, or computer.
It’s a local area network in which all nodes are individual connected to a central connection point, like a hub or a switch

Dan has installed antivirus software on his system. What is true about antivirus software?

Answers

The most accurate statement about antivirus software is that Antivirus software helps in detecting and mitigating various types of malicious software. So, the correct choice is option D.

Antivirus software plays a crucial role in identifying and removing known malware, including viruses, worms, Trojans, and other malicious programs, from a computer system. It does this by scanning files, programs, and system memory for patterns and signatures associated with malware. While antivirus software is an essential security tool, it is important to note that it does not provide complete protection against all types of cyber threats.

The threat landscape is constantly evolving, with new and emerging malware variants being developed by cyber criminals. Antivirus software relies on regular updates to its virus definitions database to stay effective against the latest threats. However, there can be a time lag between the emergence of a new threat and the availability of updates, during which the system may remain vulnerable.

To enhance security, it is recommended to combine antivirus software with other cybersecurity measures, such as regular system updates, strong passwords, safe browsing habits, and exercising caution when downloading files or clicking on suspicious links. This multi-layered approach provides a more comprehensive defense against cyber-attacks and helps ensure the security of the system and its data.

For more questions on Antivirus software

https://brainly.com/question/29944811

#SPJ8

Complete question:

Dan has installed antivirus software on his system. What is true about antivirus software? Select the most accurate statement from the following options:

A. Antivirus software provides complete protection against all types of cyber threats.B. Antivirus software can detect and remove all existing and emerging malware.C. Antivirus software guarantees 100% security and prevents all cyber attacks.D. Antivirus software helps in detecting and mitigating various types of malicious software.

Implement a class Rectangle. Provide a constructor to construct a rectangle with a given width and height, member functions get_perimeter and get_area that compute the perimeter and area, and a member function void resize(double factor) that resizes the rectangle by multiplying the width and height by the given factor

Answers

Answer:

Explanation:

The following code is written in Java. It creates the Rectangle class with the height and width variables. The constructor takes these variables as parameters to create Rectangle objects. It creates the get_perimeter method that sums up two of each side in order to get the perimeter of the Rectangle. A get_area method multiplies the height by the width to get the area. Finally, a resize method takes in a double factor variable and multiplies the height and the width by the factor to get a resized Rectangle object.

class Rectangle {

   double height, width;

   public Rectangle(double height, double width) {

       this.height = height;

       this.width = width;

   }

   

   public double get_perimeter() {

       return (this.height + this.height + this.width + this.width);

   }

   

   public double get_area() {

       return (this.height * this.width);

   }

   

   public void resize(double factor) {

       this.height *= factor;

       this.width *= factor;

   }

}

What are the two instructions needed in the basic computer in order to set the E flip-flop to 1?

Answers

Answer:

Load and save instructions. The specific instructions may vary depending on the computer`s architecture, but the general process is to load the desired value into a register and store it in a flip-flop. Below is an example of a hypothetical assembly procedure.  

Load Instruction: Load the value 1 into a register.

"""

LOAD R1, 1

"""

Store Instruction: Store the value from the register into the flip-flop.

"""

STORE R1, FlipFlop

"""
weird question but this might help

For a quick analysis of the individual amenities, you will add Sparklines.

In cell range H5:H11, add Column Sparklines that chart the advertising expense by amenity type over the months January to June.
Apply the style Dark Blue Sparkline Style Accent 5, Darker 50%.

Answers

See how to utilise sparklines to represent your data visually and demonstrate data trends. Use check marks to draw attention to certain values in the Sparkline chart.

What do Excel sparklines serve?

Sparklines are tiny graphs that show data graphically in spreadsheet cells. Sparklines can be used to draw attention to the highest and lowest values as well as patterns in a variety of values, such as seasonal peaks or valleys or business cycles. A sparkline should be placed as close as possible to its data.

What kind of sparklines are these?

Sparklines come in three varieties: Line: creates a line graph out of the data. Similar to a clustered column chart, column: visualises data as columns. Win/Loss: This method uses colour to represent the data as either positive or negative.

To know more about Sparklines visit:-

https://brainly.com/question/31441016

#SPJ1

1) What is y after executing the statements?

X = 5;
y = x + 1;
y= y * 2;
a. 5
b. 6
C. 8
d. 12

Answers

Answer: d. 12

Explanation: if X = 5, then y = 5 + 1 because in y = x + 1, You are replacing the x with 5.

y is now 6.

Now you are multiplying 6 * 2 because of y * 2. You replace the Y with the 6.

6 * 2 = 12

y = 12 or letter d

What is the importance of knowing the concept of programming?

Answers

Answer:

Computer programming is important today because so much of our world is automated. Humans need to be able to control the interaction between people and machines. Since computers and machines are able to do things so efficiently and accurately, we use computer programming to harness that computing power.

On the Excel Ribbon, click the Data tab in the Sort & Filter Group, and then click the Sort button to conduct a _____ sort. a. table range b. pivot table c. auto sum d. multiple column

Answers

Answer:

a. Table range

Explanation:

Excel is used for maintaining the data of the company. It contains various formulas, features like pivot table, macros, sort & filter group so the firm could able to present its data in an effective and efficient way

Here the sort button is used to ascending or descending the table based on the name, values, etc

So in the given situation, the first option is correct

Answer:

Datasheet, aecending, home

Explanation:

On the Excel Ribbon, click the Data tab in the Sort &amp; Filter Group, and then click the Sort button

Pick an Industry, other than the automobile industry, in which machines are likely to replace humans. Who will be displaced by those machines and how far will those riplle effects spread? Explain.

Answers

Answer:

One industry in which machines are likely to replace humans is the retail industry, specifically in areas such as cashier and inventory management. The people who are most likely to be displaced by these machines are cashiers and other retail workers who perform tasks that can be automated, such as scanning items and processing payments.

Scenario
You are sitting on a chair in a large room. You see an empty chair, facing you, across the room and it looks like it is very comfortable and reclines. You can probably get a power nap in on it. You need to get to that chair on the other side of the room and sit in it.

Answers

Answer:

Just sit on the better chair

Which of the following did you include in your notes?
Check all that apply.
how you will keep costs down
how you will offer a better product
how you will be innovative in what you offer
Id
Economía

Which of the following did you include in your notes?Check all that apply.how you will keep costs downhow

Answers

Answer:

How you will be innovative in what you offer

Explanation:

personally I think all 3 but it is what it is

true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.​

Answers

Answer:

False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.

Other Questions
Which sequence lists the levels of organization in tge human body from simplest to most complex Pliers with serrated teeth that grip flat, square, round, or hexagonal objects are ____ pliers.a. linemanb. needle nosec. tongue and grooved. slip joint ated-linked diversificationA strategy of _____ will be most beneficial for a firm to enhance its overall corporate performance. Marigold Inc. incurred a net operating loss of $575,700 in 2020. Combined income for 2017, 2018, and 2019 was $452,600. The tax rate for all years is 30%. Assume that it is more likely than not that the entire tax loss carryforward will not be realized in future years. Assume that Marigold earns taxable income of $24,000 in 2021 and that at the end of 2021 there is still too much uncertainty to recognize a deferred tax asset. Prepare the journal entries that are necessary at the end of 2021 assuming that Marigold does not use a valuation allowance account. (Credit account titles are automatically indented when the amount is entered. Do not indent manually. If no entry is required, select "No Entry" for the account titles and enter for the amounts.) Year Account Titles and Explanation Debit Cre 2021 (To record current tax expense) 2021 (To record current tax benefit) Students who review previously learned course material at various times throughout a semester to pass a comprehensive final are especially likely to demonstrate long-term retention of the course material. This best illustrates the value ofa.implicit memory.b.the serial position effect.c.rosy retrospection.d.the spacing effect. A virtual function is a member function that expects to be _________ in a derived class. RunSnakeRun.noarch is a Python GUI package installed on the server that your organization is no longer using. The IT manager in your organization has asked you to uninstall the RunSankeRun.noarch package by using the dnf command.Your task in this lab is to:Use the dnf command to uninstall the RunSnakeRun.noarch package. 1. Mllenbeck expresses concern at the beginning of the video in regard to his dentist'sintentions. Describe his situation and line of thinking. Have you ever wondered thesame thing about one of your doctors? Explain. 12. problems and applications q12 the economy of elmendyn contains 3,000 $1 bills. if people hold all money as currency, the quantity of money is $3,000 . if people hold all money as demand deposits and banks maintain 100 percent reserves, the quantity of money is $ . if people hold equal amounts of currency and demand deposits and banks maintain 100 percent reserves, the quantity of money is $ . if people hold all money as demand deposits and banks maintain a reserve ratio of 20 percent, the quantity of money is $ . if people hold equal amounts of currency and demand deposits and banks maintain a reserve ratio of 20 percent, the quantity of money is $ . A list of topics should be sent to an interviewee several days before the meeting, especially when detailed information is needed, so the person can prepare for the interview and minimize the need for a follow-up meeting.TrueFalse Erick and Mia live the same distance from the park and decide to meet atthe park one afternoon. The graphs show their distances from home overthe same 30-minute period as they walked to the park. Each section ofeach graph represents 10 minutes.Which of these statements are true?Mia returned too her house after 10 minutes. T or FMia left her house 10 minutes before Erick left his house. T or FIt took Erick only 10 minutes to walk to the park. T or FErick and Mia arrived at the park at the same time. T or FErick walked the same distance as Mia during the last 10 minutes. T or F cross-cultural studies find similar patterns of what men and women look for in their spouses across many different cultures. these findings support evolutionary personality theory because they suggest that mate preferences do not merely reflect differences in What benefit does the release of carbon dioxide have on kelp and other producers? in a two-tiered client/server architecture the functionality of the system is organized into services with each service delivered from a seperate server in the behavior modification program called , the first goal is to identify target behaviors, while the second is to gain control over these behaviors through the use of reinforcement and punishment. People with ASD often have difficulty taking the perspective of another person. This has led some experts to argue that ASD is characterized by the absence ofdysprosody.formal operational thinking.a theory of mind.social communication Find an equation in standard form for the hyperbola that satisfies the given conditions. Foci: (0,14),(0,-14). Transverse axis length: 6. ournalize the entries to record the following: check is issued to establish a petty cash fund of $1,000. the amount of cash in the petty cash fund is now $340. check is issued to replenish the fund, based on the following summary of petty cash receipts: office supplies, $383; miscellaneous selling expense, $158; miscellaneous administrative expense, $99. (because the amount of the check to replenish the fund plus the balance in the fund do not equal $1,000, record the discrepancy in the cash short and over account.) question content area a. journalize the entry to establish the petty cash fund. Divine Apparel has 2,100 shares of common stock outstanding. On October 1, the company declares a $0.75 per share dividend to stockholders of record on October 15. The dividend is paid on October 31. Record all transactions on the appropriate dates for cash dividends. (If no entry is required for a particular transaction/event, select "No Journal Entry Required" in the first account field.) Journal entry worksheet < 1 2 3 Record the declaration of cash dividends. Note: Enter debits before credits. Date General Journal Debit Credit October 01 Record entry Clear entry View general journal Which type of local government is created to meet a specific need that other local governements do not address?