Julianna wants to put data inside a variable. Which symbol should be used?

A. =
B. ()
C. <>
D. +

Answers

Answer 1

Answer:

B

Explanation:

When writing a variable if you want to add something you have to use ().


Related Questions

Match each programming language type to its key feature or use. Scientific Languages Artificial Intelligence Languages Object-Onented Languages Logical Languages designed to write programs for the robotics industry designed to write programs in which code and data are packaged together as objects, each having a specific set of attributes and methods designed to write programs with mathematical functions to perform calculations involving large amounts of numerical data designed to write programs as conditional statements based on a set of facts and rules Recet NEXT​

Answers

Answer:

AIOOScientificLogical

Explanation:

Top-down, the empty boxes would be filled with ...

AI languagesObject-Oriented languagesScientific languagesLogical languages

__

You may need to consult your curriculum materials to see what distinctions are made there. These groupings are not rigid, nor are the applications.

AI is often used to extend diagnostic or classification capability beyond what can be accomplished by logical languages. Recently, it has been applied to controls that might previously have been done by scientific or OO languages.

Answer:

The correct answers are:

Designed to write programs with mathematical functions to perform calculations involving large amounts of numerical data - Scientific Languages

Designed to write programs as conditional statements based on a set of facts and rules - Logical Languages

Designed to write programs for the robotics industry - Artificial Intelligence Languages

Designed to write programs in which code and data are packaged together as objects, each having a specific set of attributes and methods - Object-Oriented Languages

Explanation:

I got it right on the Edmentum test.

what is adb command???​

Answers

Answer:

Android Debug Bridge (adb) is a versatile command-line tool that lets you communicate with a device. The adb command facilitates a variety of device actions, such as installing and debugging apps, and it provides access to a Unix shell that you can use to run a variety of commands on a device.

Explanation:

I hope this helps!!

Brainless is one the way if you help

Answers

Answer:

1. x - 6

2. p - ? = 7

i chose these equations because

a number - 6 = the weight of your backpack.

p - an unknown number without a substitute variable = slices of bread left.

A _________________ is a framework defining tasks performed at each step in the software development process

Answers

Answer:

Workflow?

Explanation:

I don't really know this is just my best guess.

for what work photoshop is used?

Answers

its for making commercials and background that look cool
Adobe Photoshop is a software used for editing photographs, compositing digital art, animating, and graphic design

URGENT PLEASE HELP ITS WOULD BE MOST HELPFUL
What does input allow a computer to do? A. create an algorithm B. complex math problems C. quick calculations D. receive information

Answers

Answer:

D. Receive information.

Explanation:

A is for coding, and B & C are for real-world and/or online calculators.

Brainy users come back and answer some questions some of us really need help get your ponits today and you will feel good mean while you answer questions other people might have.!

Answers

Answer:

of course we will answer any question at any time

Choose the comparison operator that will create a true statement. 30 = 50 27 > 50 48 < 50 45 > 50

Answers

Answer:

48 < 50

Explanation:

Basically, with the greater than or less than symbols (< & >) there's a way I think about it that makes it easier.

think of the symbol as a crocodile. The crocodile always eats the bigger number.

Find the inverse of the following matrices:
1.
3 -6 -1 4

2.
[1 2 3 7 6 5 ] 8 1 0

Answers

Answer:

Multiply by the unit squared

The matrices a) and c) are invertible and their inverses are [-2.5 0.5 3; 1.5 -1 -3; -0.5 0.5 1] and [0.5 1.5 5.5; 2.5 6.5 14.5; -2 -5 -11], respectively. The matrix b) is not invertible and we cannot find its inverse.

What is determinant?

In order to determine whether a matrix is invertible, we need to calculate its determinant. If the determinant is not equal to 0, then the matrix is invertible and we can find its inverse. b then the matrix is not invertible and we cannot find its inverse.

The determinant of the matrix [2 1 2; 0 5 3; -1 1 0] is (2)(5)(0) + (1)(3)(-1) + (2)(0)(1) - (2)(1)(3) - (1)(5)(-1) - (2)(0)(0) = -3 + 5 = 2. Since the determinant is not equal to 0, the matrix is invertible. The inverse of the matrix can be found using the formula:

[2 1 2; 0 5 3; -1 1 0]^-1 = (1/2) * [5 -1 -6; -3 2 6; 1 -1 -2] = [-2.5 0.5 3; 1.5 -1 -3; -0.5 0.5 1]

The determinant of the matrix [3 -6; -4 8] is (3)(8) - (-6)(-4) = 24 - 24 = 0. Since the determinant is equal to 0, the matrix is not invertible and we cannot find its inverse.

The determinant of the matrix [1 3 2; -1 1 3; 2 2 -1] is (1)(1)(-1) + (3)(3)(2) + (2)(-1)(2) - (1)(3)(2) - (3)(1)(-1) - (2)(2)(3) = -1 + 18 - 4 - 6 + 3 - 12 = -2. Since the determinant is not equal to 0, the matrix is invertible. The inverse of the matrix can be found using the formula:

Therefore, the matrices a) and c) are invertible and their inverses are [-2.5 0.5 3; 1.5 -1 -3; -0.5 0.5 1] and [0.5 1.5 5.5; 2.5 6.5 14.5; -2 -5 -11], respectively. The matrix b) is not invertible and we cannot find its inverse.

To know more about inverse of a matrix refer here:

brainly.com/question/4017205

#SPJ7

What information most likely presents a security risk on your personal social networking profile?.

Answers

Answer:

Your personal social networking profile may pose security risks if you post certain information publicly. Individuals' Personally Identifiable Information (PII) or Protected Health Information (PHI) is considered to be PHI.

Explanation:

hope this helps!!!!!

The information that is most likely presents a security risk on your personal social networking profile is birthday and hometown. The correct option is B.

Your birthday and hometown are the two pieces of information on your personal social networking page that most likely pose a security issue. Malicious persons may use this information to pose as you or obtain unauthorised access to your accounts.

Through identity theft or phishing scams, attackers may try to use your birthdate to access sensitive information about you, like your social security number or account passwords.

Your online accounts could be compromised if someone uses information about your hometown to crack passwords or figure out security questions.

To safeguard your privacy and improve your online security, you should exercise caution while disclosing such sensitive personal information on social media networks.

Thus, the correct option is B.

For more details regarding social networking, visit:

https://brainly.com/question/29708102

#SPJ6

Your question seems incomplete, the probable complete question is:

What information most likely presents a security risk on your personal social networking profile?.

A) Status

B) Birthday and hometown

C) List of favorite movies and music

D) Number of friends and followers

Etna works on many projects. As she creates a new project file, she goes to the File tab, selects Options, and then goes to the advanced category for the General section to check a box. What is she trying to do

Answers

What Etna is trying to do by going to the file tab and the general section is to Create a new file with a set of parameters.

Steps to creating a new file.

In order to create a new file you have to do the following:

You have to go to the file tab.Then you go to click optionsThe next is the advanced categorythe checkbox is located in the general section.

Following all of the steps that are listed above would help Etna as she works on her project.

Read more on ways to create files here:

https://brainly.com/question/25554117

Sonia is buying a new phone for her grandmother so she can communicate with her on a daily basis. However, because her grandmother is not tech-savvy, Sonia needs to find a phone that has a simple user interface. Which type of operating system will work best for Sonia's grandmother

Answers

The type of operating system that will work best for Sonia's grandmother is an Apple ios.

What is an Operating System?

An operating system (OS), is a system software program  that help a  computer  to manage its resources in terms of allocation of functions among  programs. The common Operating system includes

Microsoft WindowsApple mac OSLinuxAndroid Apple iOS.

Apple ios is proffered for the elderly because it is the with the simplest learning curve and a simple  user interface.

Some of its features includes that :

its  font size can be increased  for better readabilityit has the app Siri that obeys voice commands Emergency SOS can be set up in case of emergency.

Therefore Sonia should consider buying her grandmother a device with an Apple ios.

Learn more on Operating systems: https://brainly.com/question/2126669

A crime involving digital media, computer technology, or related components is best called an act of

Answers

Answer:

digital malfeasance

Explanation:

if an individual does a crime with digital media is doing digital malfeasance

In order for a computer to pass the ________, a human should have a conversation with it and not be able to tell if it was a machine or a human.

Answers

The test that a computer needs to pass after a human's conversation with it and not be able to tell if it was a machine or a human is; Turing Test

Test of Computers

The correct answer to the blank portion of the question is Turing test. This is because Turing Test is a test of a computer's ability to exhibit intelligent behavior that is equivalent to, or indistinguishable from, that of a human's behavior.

Finally, If the evaluator cannot reliably tell the computer from the human, the machine is said to have passed the test.

Read more about Test of Computer at; https://brainly.com/question/21283135

When Alice turned on her laptop this morning, the screen displayed only colorful horizontal lines. Which of the following is most likely to have a problem? a. video card b. built-in camera c. external storage devices

Answers

Based on the provided information, the screen displayed only colorful horizontal lines, what is  most likely to have a problem is the video card .

This is because the video card, contain graphics processing unit .

What Is a video card?

video card can be regarded the integrated circuit which generates the video signal sent to a computer display.

Learn more about video card, at;

https://brainly.com/question/7828376

What is the primary tool that retrieves data and helps users graphically design the answer to a question

Answers

Query by Example (QBE) is the primary database query tool in which the user sets conditions for search selection.

What is Query by Example?

It is a database query language where the first results presented are those that the search engine considers the most relevant for the search carried out.

It is characterized by having a system for ranking and ordering search results that allows the user to return more relevant results.

Therefore, we can conclude that Query by Example (QBE) is the primary database query tool in which the user sets conditions for search selection.

Learn more about Query by Example (QBE) here: brainly.com/question/7479160

Assuming each operating system installed requires 2GB of RAM, what is the minimum amount of physical RAM that will need to be installed in the host system to meet the requirements of this scenario

Answers

Answer:

3gb i believe

Permissions granted from an individual for the use of a likeness is known as a

- likeness release
- location release
- model release
- media release

Answers

likeness release is the term known when a person grants you the ability to use a picture of them





Why are volt guards necessary to connect with the computer? .:​

Answers

It prevents our computer system against sudden power surge. ... As we have known that our computer needs voltage between 220 to 240 volts and high or low voltage affects our computer, Volt Guard plays important role to save our computer system from damage due to high voltage.

Which of the following can be used to enter or display one complete row of information in a range or table
without scrolling horizontally?

Answers

Answer:

A. Create

Explanation:

I just took the test for Microsoft Access the answer to Which of the following can be used to enter or display one complete row of information in a range or table without scrolling horizontally? is Create

The one that can be employed to show an entire row containing information in a table would:

Data Form

What is Data Form?

The data form is described as the source in Microsoft Excel that offers the user an option to either enter or show a whole row having details or information without even scrolling the cursor west to east or horizontally.

This option has made the data editing very convenient and quick for the users and made the process more effective and efficient.

This is very useful with this option as one can continue data entry more easily as it helps in keeping records more quickly.

Thus, the above response is correct.

Learn more about "Table" here:

brainly.com/question/14231889

Knowledge of some sorts is likely to be represented by a broad pattern of activation spread across a network. This reflects

Answers

An subject of distributed representation relates to when some knowledge of some sorts is likely to be represented by a broad pattern of activation spread across a network.

What is distributed representation?

In technology, distributed representation refers to similar data features across multiple interdependent layers.

In conclusion, the subject of distributed representation relates to when some knowledge of some sorts is likely to be represented by a broad pattern of activation spread across a network.

Read more about distributed representation

brainly.com/question/17673062

A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol

Answers

Answer:

What kind of question is this?! It's likely that every answer is technically right.

Explanation:

Signals being sent take place over everything. The answer you're looking for is most likely the Transport Layer though. TCP is connection-orientated.

In a 100m sprint, identify some of the phases that you would see the athlete complete?

Answers

Answer:

in a 100m sprint identify some of the phases

Explain the importance of electronics on our daily lives”? 5 sentences minimum

Answers

Answer:

through electronics we have a electrified lighted world. our homes,are lit with light using electricity. the stereo we listen to, electricity makes it happen. tv,computers, and record turntables all need electricity. electricity makes things possible that would otherwise be either impossible or very arduous. we see sounds and enjoy them. we watch entertaining movies. we read books and do our homework with the appreciated help of electricity.

Which of the following is an example of a JavaScript property?
A. window
B. border
C. document
D. table

Which of the following is an example of a JavaScript object?
A. background color
B. border
C. color
D. window

Answers

D. Window

Explanation:

Its because everything is an object in Java script

it important to have media images reflective of diverse communities? Why, or why not?

Answers

Answer:

Yes.

It is important because a POC would want to believe that they can achieve a goal in life because they set it, so by seeing themselves represented gives them confident.

Which of the following can be used to enter or display one complete row of information in a range or table
without scrolling horizontally?

Answers

End users can use database tools to enter or display one complete row of information in a range or table on Microsoft Excel without scrolling horizontally.

What is Microsoft Excel?

Microsoft Excel can be defined as a software application that was designed and developed by Microsoft Inc., for analyzing and displaying (visualizing) spreadsheet documents by using rows and columns in a tabulated format.

In Microsoft Excel, end users can use database tools to enter or display one complete row of information in a range or table on Microsoft Excel without scrolling horizontally. Some examples of these database tools include:

PivotTablesExcel Tables

Read more on database here: brainly.com/question/26053797

Legends are titles given to three-axis X, Y, and Z-axis. True or false?

Answers

Answer:

true the legends are the names on each side of the chart that show what the chart shows

true

Hope This Helps!!!

HELP URGENT
When programming, which of the following is true of the editor? A. It is a person who checks your work for spelling errors. B. It is where you write your program and run it. C. It is a coding language. D. It is a program that checks for grammatical errors.

Answers

Answer:

D. It is a program that checks for grammatical errors.

Answer all the questions correcty and the first answer get to be marked brainliest!!!!!!
1. ___________________ is a sort of advertisement that disturbs your Web browser by
appearing in a separate window on the top of your current window.
2. The ____________________ is a quick and easy way to create new objects in MS
Access.
3. _________________ present data from tables and queries in an attractive format.
4. . A __________________ is a column in a table that contains a specific piece of
information within a record.
5. What is the storage capacity of a free Picasa account?
6. What displays the current record number and navigate to other records?
7. Name any five tools present in MS Access Window.
Need it now!!!

Answers

allowed public advertisement

opening a new database

column format

database record

1gb

the navigation button will show the current record and the correct no.

table,querie,relatinship,macros,forms

Other Questions
Answer soon as possible would be appreciated!!!!The events taking place in two different locations are described below:Location A: Movement of plates causes hot spots to move to a location with thinner crustLocation B: Tectonic plates move away from each other under the seaIn which location will active volcanoes most likely be formed and why? Location A, because the magma breaks through the thin crust Location A, because cracks between plates are filled with molten rocks which solidify Location B, because the oceanic plate and continental plate are pushed up through the crust Location B, because the thinner oceanic plate will be pushed under the continental plate How does Ibsen use dramatic irony to create suspense in this passage?Rank says that he thought Nora would be dressed up, while Helmer says that he did not expect her to be.Nora tells Helmer that there are no letters in the box, while the audience knows that there is a letter from Krogstad.Nora says that no one can see her in her costume until the party, where she will dance the tarantella.Helmer and Rank promise to help Nora practice dancing, because she has not been practicing all day. Can someone help me with this pleaseee what is the right quotation for Under that bridge is a golden treasure said John hcf of 18 & 24Lcm of 18 &24 PLEASE HELP ME QUICKKK, FIRST CORRECT PERSON GETS BRAINLIEST Player Aled a baseball league in runs batted in for the 2005 regular season. Player B, who came in second to player A, had 18 fewer runs batted in for the 2005 regularseason. Together, these two players brought home 232 runs during the 2005 regular season. How many runs batted in did player A and player Beach account for?CEPlayer A had runs and player B had runs batted in for the 2005 regular season. What is the name of Cu4C? Ricky is 5 years older than Ciara. In 6 years the sum of their ages will be 53. How old is Ricky now what extent was the Gupta Empire a continuation of the Mauryan Empire. Paulo has R$80.00 and Carlos has 2/3of that amount. How many Carlos has? How many do the two have together? Dr.Purple wants to buy candy bars for all his 143 math students. He buys 9 cases plus 8 more individual bars. How many bars are in each case? Write a short speech on Harriet Tubman no links Based on the underlined words in the text, what inference can be made about the authors perspective? Female authors are reserved, so they prefer to remain anonymous. Society discriminates against women, so female writers often hide their identity. Judith Shakespeare did not face the same challenges as other women of her era. Female authors are just as talented as male authors, and they get equal recognition. Tropicalcyclone of nival The purpose of _____ is to set goals and decide on the courses of action that will be used to achieve them. What is the relationship between absorbance and transmittance of a sample in a spectrophotometer?- indirect- Direct- No relationship Plz help!! It is possible for psychologists to study variables such as hunger, motivation, and self-esteem because these variables can be measured by How did World War II influence colonies to seek independence? pls help fast It takes 78.2 J of energy to raise the temperature of 45.6g of lead by 13 degrees celsius. What is the specific heat of lead?Pls Help!!!!