Which of these is not a rule for creating variable names?
You can’t begin with a number.
You can’t have spaces.
You can’t begin with a special character.
You can’t begin with an upper-case letter.

Answers

Answer 1

Answer:

You can't have spaces...........


Related Questions

1.Which of these is used to create a table in MS Access?
a. Datasheet View
b. Table Design View
c. Both a and b​

Answers

Answer:

I believe it's both a and b.

Explanation:

Hope this helps! ^^

C . Both a and b......

A user clicks. such as option buttons and check boxes in a dialog box to provide information

Answers

Answer:

It's an input,

Create a program to determine the largest and smallest number out of 15 numbers entered (numbers entered one at a time). This should be done in a function using this prototype: double larger (double x, double y); Make sure you use a for loop expression inside your function. Enter 15 numbers 11 67 99 2 2 6 8 9 25 67 7 55 27 1 1 The largest number is 99

Answers

Answer:

#include <iostream>

using namespace std;

double larger( double x, double y){

   if (x > y){

       return x;

   } else{

       return y;

   }

}

int main(){

   int n, max = 0;

   for (int i =0; i < 15; i++){

       cout<< "Enter item"<< i+1 << ": ";

       cin>> n;

       cout<< "\n";

       max = larger( n, max);

   }

   cout<<"The maximum number is: "<< max;

   return 0;

}

Explanation:

The C++ program defines the function 'larger' that compares and returns the largest of two numbers. The main program prompts the user for 15 numbers and the larger function is called to return the largest of the fifteen numbers given.


You use utility software to
Select all that apply

Answers

to help analyze, configure, optimize or maintain a computer. Utility software usually focuses on how the computer infrastructure (including the computer hardware, operating system, software and data storage) operates.

When preparing the heading for an MLA Format Academic Report, which of the following shows the proper order of the for lines of the header?

A. Student Name, Instructor, Course, Date
B. Instructor, Course, Student Name, Date
C. Course, Student Name, Instructor, Date
D. Student name, Date, Instructor, Course

Answers

Answer:

A. Student Name, Instructor, Course, Date

Explanation:

Begin one inch from the top of the first page and flush with the left margin. Type your name, your instructor's name, the course number, and the date on separate lines, using double spaces between each. Double space once more and center the title

which option enable you to change the background colour of a slide​

Answers

Explanation:

In order to change the background color in Microsoft PowerPoint 2010 we need to go to View and Slide Master. Then, right click on the first slide and click Format Background. Then you can access the background options, including a way to change the background gradient effect or use a solid background color.

Which of the basic data structures is the most suitable if you want to be able to insert elements in the middle in O(1)?
A. Array
B. Queue
C. Linked list
D. Stack

Answers

Answer:

A. Array

Explanation:

An array is a data structure that holds a collection of similar data types. Though it is ordered, the location of the array is indexed, which means that the items of the array can be accessed and retrieved with their index location values (starting from 0 to n).

The time complexity of accessing or retrieving a specific item in an array is O(1) which is a constant of the specified item.

how to hack free fire dimond

Answers

Explanation:

no way

your account gets banned if u try

Answer:

Its easy

Explanation:

Give Money to the guy in the cyber then he will hack for you ,

What's the difference between an IDS and an IPS?

Answers

Answer:

Following are the differences between IDS and IPS

IDS is a monitoring and detection system whereas IPS is a controlling system.IDS does not execute any action on its own whereas IPS accepts or rejects the packets based on the ruleset provided.IDS requires human involvement to review the results whereas IPS updates the database by the new threat faced.

Explanation:

Intrusion Detection System ( IDS )

The system analyzes the network traffic for signals that shows that the attackers use to hack and steal the data is known as Intrusion Detection System ( IDS ). It detects different kinds of behaviors, like security violations and malware.

Intrusion Prevention Systems (IPS)

IPS works like a firewall between the external world and the internal network. IPS actively protects the network from threats based on the security profile provided.

2. The Internet could best be described as: *
10 points
WWW
A large spider web
A series of roads and highways
A never ending tunnel

Answers

Answer:

Explanation:

All options are correct.

5.

What will be displayed when this program finishes running?

var numbersList = [20, 10, 5]

appendItem(numbersList, 50)

appendItem(numbersList,100)

removeItem(numbersList,1)

insertItem(numbersList, 0, 30)


console.log(numbersList.length)

Answers

Answer:

Explanation:

5 is correct answer

Answer:

D. 5

Explanation:

What does 'online social networking' mean?

Answers

Answer:

The 3rd one is correct :)

Did anyone do 5.7.5 Factorial on Code HS??



20 POINTS

Answers

I’m so sorry that you have no more than me and I have to ask you something

There are many advantages and some disadvantages to using social media. Explain at least one of the advantages to
social media use and at least one of the disadvantages. Do you think that the widespread use of social media is a good
thing over all? Why or why not?

Answers

Answer:  yes

Explanation:social media has the advantage of long distance communication and a disadvantage is cyber bullying and yes i thank if most people where nice long social media is good  

Custom actions help your users by

Answers

Answer:

D) Making it fast and easy to interact with information in your organization.

Explanation:

PLEASE MARK ME AS BRAINLIEST

Which of these file types does not share info in a spreadsheet?

Answers

Answer:

A file with extension ".exe".

or A system file

if you were an architect planning on building a large scale Municipal complex what type of engineer would you identify as essential to the Project's success
mechanical engineer
structural engineer
civil engineer
computer engineer​

Answers

Answer: civil engineer

Explanation:

Based on the information given, the type of engineer that would be identified as essential to the success of the project would be the civil engineer.

Civil engineers are the engineers that are in charge of the planning and overseeing building and infrastructure construction. They plan and monitor constructions involving bridges, road, houses, power plants etc.

Answer:

The answer is civil engineer.

Explanation:

hich of these statements is a value statement?
a.
Tacos are delicious.
b.
Lying is wrong.
c.
Cooking is hard.
d.
Puppies are funny.

Answers

The answer to your question is b
the answer would be B, lying would be the “value” part of the statement

Write a function called getRowTotal. This function should accept a two-dimensional int array as its first parameter (the array has 5 columns) and an integer as its second parameter. The second parameter should be the subscript of a row in the array. The function should return the total of the values in the specified row. Only write the function no need to write the main function

Answers

Answer:

The solution is implemented using C++

int getRowTotal(int a[][5], int row) {

  int sum = 0;

  for(int i =0;i<5;i++)

  {

      sum += a[row][i];

  }

  return sum;

}

Explanation:

This defines the getRow function and the parameters are arr (the 2 d array) and row and integer variable

int getRowTotal(int arr[][5], int row) {

This defines and initializes sum to 0

  int sum = 0;

This iterates through the row and adds the row items

  for(int i =0;i<5;i++)    {

      sum += arr[row][i];

  }

This returns the calculated sum

  return sum;

}

Print air_temperature with 1 decimal point followed by C. Sample output from given program: 36.4C Python?

Answers

Answer:

print( f"{round(air_temperature, 1)}C")

Explanation:

The print function is a function in python used to output the result of the program. The 'f' is a python3 syntax used to format strings, while the round function is used to return a float number with a specified number of decimal points.

The code above outputs a string of the float number variable air_temperature in celsius.

Answer: print(f'{air_temperature:.1f}C')

Explanation:

The letter 'f'  indicates that this string is used for formatting. 1f basically means that we are looking for one decimal point. That is how we get the .4 instead of more decimals.

If we had 3f for example, we would see 36.400

We then include C after the brace so that is ends with C.

Write a procedure that takes a positive integer as a parameter. If the number given to the procedure is no more than 30, the procedure should return the absolute difference between that number and 30. If the number is greater than 30, the procedure should return the number doubled.

Answers

Answer:

The following code is written in C++

#include<iostream.h>

int main()

{

int n;

cin>>" Enter Number>>n;

if(n < 30)

      {

            cout<<"Absolute Difference is 30";

      }

else

       {

             cout<<"Absolute Difference is "<< 2*n;

       }

return 0;

}

what happens if none of the selector values match selector in a simple case expression in pl/sql

Answers

Answer:

If no values in WHERE clauses match the result of the selector in the CASE clause, the sequence of statements in the ELSE clause executes. ... When the IF THEN statement has no ELSE clause and the condition is not met, PL/SQL does nothing instead raising an error.

Explanation:

A spreadsheet is an example of a(n):

Answers

Answer:

general-purpose application

Explanation:

General purpose application

1. These are software applications which can be used for multiple purposes.

2. These applications perform various tasks as per the need of the user. These tasks can vary in complexity and may or may not be related to each other.

3. These applications are useful for almost all categories of users.

Example include spreadsheets which is a primary application for accounting purpose. It can also be used for to store numerical data or other data in an organized format.

Another use of spreadsheets is visible in data analysis. Graphs and charts can be created based on the given numerical data stored in the spreadsheet. This helps in business growth.

Microsoft Excel and Apple Numbers are spreadsheet applications.

Another example is a word application that can be used to prepare document, reports, and flyers also. Microsoft word is a word processor.

Specialized program

1. These are software applications which can be used for special purpose only.

2. These applications can perform only the task for which it is created.

Examples include windows media player. This application can only run media (audio or video) programs.

System application

1. These include operating system and utility applications.

2. The operating system acts as an interface between the user and the hardware resources of the computer.

For example, Windows is an operating system. It is available in various versions.

3. The computer system and its resources, both software and hardware, are maintained and optimized using utility applications.

Anti-virus is an example of utility applications. It protects the computer resources from virus.

Utility applications

4. The computer system and its resources, both software and hardware, are maintained and optimized using utility applications.

5. These applications are mandatory to smooth functioning of a computer.

For example, disk driver, file manager and back up applications help in managing disks and aid in taking back ups and file management is done by file manager

7) Which of the following is False regarding RISC and CISC architectures?
a) CISC has variable length instruction formats while RISC has fixed length instructions. b) CISC has a larger number of instructions than RISC.
c) CISC has more addressing modes than RISC.
d) In RISC, memory access is limited to load and store instructions, while in CISC, other instructions can support memory access.
e) CISC has a larger number of general purpose registers than RISC.

Answers

D hope that helps
Have a. Good one

Recursion is a method in which the solution of a problem depends on ____________ Larger instances of different problems Larger instances of the same problem Smaller instances of the same problem Smaller instances of different problems

Answers

Answer: Option C  Smaller instances of the same problem.

Explanation:

In computer science, recursion is a method by which the solution of the problems can be get by solving the problem to many smaller instances of the same problem.

It can be done by iteration by this has to be done at the time of programming, by identifying and  indexing.

Recursion is one of the main central idea in the filed of computer science.

Melissa wrote the following method in Java. It is designed to compute 2^n, but returns an incorrect result. In which line has she made a mistake?
public static int powerTwo(int n)
if (n == 1){
return 1;
} else {
return 2 + powerTwo(n-1);

Answers

Answer:

public static int powerTwo(int n) {

  if (n == 0){

     return 1;

  } else {

     return 2 * powerTwo(n-1);

  }

}

Explanation:

There are actually three mistakes:

2⁰ = 1, so the end criterium of the recursion should be n==0the + should be a *various curly braces missing

Write a program that inputs a text file. The program should print the unique words in the file in alphabetical order. Uppercase words should take precedence over lowercase words. For example, 'Z' comes before 'a'.

Answers

Answer:

unique = []

with open("file_name.txt", "r") as file:

   lines = file.readlines()

   for line in lines:

       # assuming comma is the only delimiter in the file

       words = line.split()

       for word in words:

           word = word.strip()

           if word not in unique:

               unique.append(word)

unique = sorted(unique)

print(unique)

Explanation:

The python module opens a file using the 'with' keyword (the file closes automatically at the end end of the indentation) and the open built-in function and reads the content of the open file as a list of lines of the content.

Each line is split into a list and the unique words are collected and stored in the unique list variable.

The program is an illustration of file manipulations.

File manipulation involves writing to and reading from a file

The program in Python where comments are used to explain each line is as follows:

#This creates an empty list

wordList = []

#This opens the file

with open("myFile.txt", "r") as file:

   #This reads the file, line by line

   lines = file.readlines()

   #This iterates through each line

   for line in lines:

       #This splits each line into words

       words = line.split()

       #This iterates through each word

       for word in words:

           #This removes the spaces in each word

           word = word.strip()

           #This adds unique words to the list

           if word not in wordList:

               wordList.append(word)

#This prints the unique words in alphabetical order

print(sorted(wordList))

Read more about similar programs at:

https://brainly.com/question/19652376

16 Select the correct answer. Rachel has set up a computer network. In this network, due to a device, the computers partake in the message transfer process. Which device is this? ОА. NIC B. hub C. modem D. switch E. bridge Reset Reset Next​

Answers

Answer:D. switch

Explanation:cause it is

Can you withdraw from courses in top hat?

Answers

Answer:

Yes, but this must be done before the withdraw deadline

Explanation:

TopHat is an online learning platform. Students register for courses and if they decide not to continue with a course for reasons best known to them, they are allowed a time period usually one to two weeks to drop the courses. They are then reimbursed the fee for that particular course.

But if that time period elapses and they drop the course, that is considered a withdrawal that is not accepted and which no provisions for reimbursements are made.

In 2002, Congress passed the Federal Information Security Management Act (FISMA), which mandates that all federal agencies __________.

Answers

Answer: implement plans regarding information security so that sensitive data can be protected.

Explanation:

FISMA is an acronym that simply means Federal Information Security Management Act. This Act was passed by the Congress of the United States in 2002. According to the Act, there should be implementation of plans regarding information security by every federal agencies so that sensitive data's can be protected.

This was necessary so that there can be integrity, and confidentiality with regards to the informations that are system related.

Other Questions
10. How many moles of Ne are in a 0.50L tube at 200kPa and 50 C? 11,60 Leslie and her friend eat lunch at a restaurant.To determine how much money to leave as a tip, she multiplies the bill by 0.18.How much money should she leave as a tip if the bill is $25?A.$6.25B.$5.00C.$4.50D.$3.70 Write your answer with no space and any fraction with / Interest = $45Principal = ?Interest rate = 3%Time = 2 years Calculate the acceleration between D and E. Sherrie and Kyle _____ books.readreads Just before the French Revolution, he had the idea to serve "restaurers" - hot soupsto villagers. Other entrepreneurs followed suit, and Paris quickly became home todozens of restaurants.A.) Louis XVI B.) Monsieur Simone C.) Monsieur Boulanger Please! Im in a rush!!! Ill give brainliest FREE BRAINLIEST!!!When recording a macro, the cursor will look like a _____ to indicate it is recording. A.microphone B. Arrow C. CD D. cassette tape 5 All of the following flourished during boththe Tang and the Song dynasties, exceptA art and culture.B sea voyages of exploration.C science and technology.D trade. Rectangle RSTU and the image RSTU are graphed on the coordinate grid below.On a coordinate plane, rectangle R S T U has points (1, 1), (1, 4), (5, 4), (5, 1). Rectangle R prime S prime T prime U prime has points (negative 1, 1), (negative 4, 1), (negative 4, 5), (negative 1, 5).Which statements describe the rotations about the origin that could have transformed RSTU to RSTU? Check all that apply. Please help me, tell me how you got it and the correct answer Babylon is the name of _____.A) empireB) a bazaar C) a marketplaceD) a city Which of The following system of equations is solved, what would be the value of the Y coordinate?3x + 4y = 76x - 4y = 38A)5B)-5C)2D)-2 How do I calculate the linear scale factor for this dilation? There are a total of 34 lions and hyenas. Each lion eats 4 antelope. Each hyena eats 3 antelope. 117 antelope are eaten in total. Find the number of Lions and hyenas. Imagine youre long lost rich Uncle Theo has left you $3 million dollars. Part of the will states that you need to support the visual arts in some way with a portion of this inheritance. What type of patron would you be: would you support a museum/gallery, or would you fund an individual artist? Why do you feel this is the best way to support visual art? Depending on your answer to the first question, choose a contemporary artist or a museum from the list to be a patron for. Justify/explain your choice by explaining why it is important to support this specific museum or artist. What about this museum or artist made you choose them to support? How are you going to support them? How is this form of support beneficial to who you are supporting? Money with no strings? Have the museum/gallery purchase art from a specific artist or type/movement of art? Commission the artist to make something specific for you? Support a specific project by the artist? jesse bought a car for 2,200,000 he sold for a 20% profit from the money raised from the sale he bought another more expensive car which unfortunately he had to sell for a 10% loss that was his overall profit or loss Do you think an Ecologist would classify nutrients as living things or nonliving things? Explain why. Please help this is a school assignment I will mark brainlliest for first answer.(This is 7th grade science). Does silver form a gas? Yes or no.