Three of the following values could be stored as strings. When would you NOT use a string command? O To store a word. O To store values NOT used for calculations. O To store decimal values. O To store a list of colors.​

Answers

Answer 1

Answer:

To store decimal values

Explanation:

Decimal values are considered a float data type, not a string, so if the question is asking for the only thing that couldn't be stored as a string, it would be a decimal value.

Decimals can be stored as a string in certain situations, but it would have no value in a mathematical equation.


Related Questions

Which word or phrase refers to an increasingly common method of computing and storing files?

A.
Virtual downloads

B.
Outsourcing

C.
Digital technologies

D.
Cloud computing

Answers

The answer is Cloud computing
Hope this helps-

Answer:

cloud computing

Explanation:

Guess The Lyrics:
She like the way that I ______
She Like The Way That I _____
She Like The Way That I ______
She Like The Way That I

Answers

she like the way that i *DANCE*
she like the way that i *MOVE*
she like the way that i *ROCK*
she like the way i *WOO*

song : DIOR pop smoke

Answer:

Explanation:

She like the way that I _Dance_____She Like The Way That I __Move___She Like The Way That I ___Rock___She Like The Way That I Woo

write query for all products reutrn product name with its amounts due, paid, canceled, and refunded, order the result by product name ascending

Answers

Answer:

SELECT product_name, amount_due, amount_paid,

              cancelled, amount_refunded

   FROM products

ORDER BY product_name ASC;

Explanation:

SQL (Structured Query Language ) was used above.

The SELECT command is used to list all the variables we want in our output.

The FROM command signifies the location.

ORDER BY command ensures that your result is ordered

ASC means Ascending Order.

; signifies the end of the query.

NOTE: Underscores were used because variables cannot be written with spaces between them

You are implementing a RAID storage system and have found a system with eight 100 GB drives. How much storage space will you have available? How does the OS handle this RAID?

Answers

Answer:

The space available will vary between 800 GB (100%) and 400 GB (50%) of the total disks, depending on the RAID level.

The OS will handle the RAID as a single disk.

Explanation:

Each RAID level implements parity and redundancy in a different way, so the amount of disks used for this extra information will reduce the space available for actual storage.

Usual RAID levels are:

RAID 0: does not implement any redundancy or parity, so you will have available 100% of the total storage: 8 x 100 GB = 800 GB

RAID 1: Duplicates all the information in one disk to a second disk. Space is reduced in half: 400 GB

RAID 5: Uses the equivalent of 1 disk of parity data distributed evenly on each disk, meaning the space available is [tex]\frac{n-1}{n}[/tex] of the total disks: [tex]\frac{7}{8}[/tex] of 800 GB = 700 GB

Writting and reading the information on a RAID storage is handled by a raid controller, either implemented in hardware or software. The OS will "see" a single disk and will read or write information as usual.

Using the constant, declare a 1D array to store 10 integers ii. Write a loop that fills the array with 10 random numbers g

Answers

Answer:

Following are the code to this question:

#include <iostream>//defining header file

#include <cstdlib>//defining header file

using namespace std;

int main()//defining main method

{

const int ax[10]={1,2,3,4,5,6,7,8,9,10};//defining a const array ax that store 10 numbers

int r_num[10];//defining an array r_num

int i;//defining integer variable

for(i=0;i<10;i++)//defining for loop to calculate and store random numbers in array

{

   r_num[i]=rand()%100; //use rand function to store value in array

}

cout<<"Elements of the array that stores 10 random numbers: "<<endl;//print message

for(i=0;i<10;i++)//defining for loop for print array value

{

   cout<<r_num[i]<<endl;//print array value

}

return 0;

}

Output:

Elements of the array that stores 10 random numbers:  

83

86

77

15

93

35

86

92

49

21

Explanation:

In the above-given program, two arrays "ax, and r_num" is declared that store value in it, in which the ax array use the const keyword and in the r_num it uses the loop and random function which can be defined as follows:

In the second array "r_num", two for loop is declared, in which the first loop uses the rand function to store value in the array, and in the second array, it prints the value of the array.

When you pass an array name as an argument to the function what is actually being passed

Answers

Answer:

The Base address of the array is being passed

here's a better picture of my pc mouse and keyboard​

Answers

Answer:ok

Explanation:

Answer:

what r ue grades

Explanation:

What is the purpose of application software (software that is not part of the operating system or utilities)?
A. The set of minimal instructions that allows your computer to load the operating system
B. Software that coordinates the working of the pieces of the system unit (firmware and hardware)
C. Programs that the user manipulates to accomplish computer-related tasks ..

Answers

Answer:

c

Explanation:

Programs that the user manipulates to accomplish computer-related tasks is the purpose of application software. Hence, option C is correct.

What is application software?

Application software is a category of computer program that carries out particular business, educational, and personal tasks. Every program is made to help users do a range of tasks, some of which might be connected to productivity, creativity, or communication.

The computer programs we use on a daily basis are the most prevalent examples of application software. This software package comes with Microsoft Office, PowerPoint, Word, Excel, Outlook, and more. Software for music applications like Pandora and Spotify.

Application software comes in a wide variety of forms, such as open source, freeware, shareware, and licensed software. Application software can be installed or run online.

Thus, option C is correct.

For more details about Application software, click here:

https://brainly.com/question/14612162

#SPJ2

In a network that uses distance-vector routing protocols, what information is included in the update sent out by each router?

Answers

Answer:

Network or next hop associations

Explanation:

In a network that uses distance-vector routing protocols, the information that is included in the update sent out by each router is "network or next hop associations."

This information is contained in a routing table. It commands a router on which destination is most favorable. It is done by carrying the packet to a certain router that indicates the next hop along the way to the last destination.

In a network that uses distance-vector routing protocols, the information that is included in the update sent out by each router is the network or next hop association.

A distance-vector routing protocol in data networks is vital for determining the best route for the packets that are based on the distance.

It should be noted that distance-vector routing protocol simply measures the distance based on the number of routers that a packet will have to pass. The information that is vital will be the network or next hop association.

Read related link on:

https://brainly.com/question/20595433

Define the missing function. licenseNum is created as: (100000 * customID) licenseYear, where customID is a function parameter. Sample output with inputs 2014 777: Dog license: 77702014

Answers

Answer:

Written in Python:

def licenseNum(licenseYear, customID):

    output = 100000 * customID + licenseYear

    print("Dog license: "+str(output))

 

Explanation:

This line defines the function with parameters licenseYear and customID

def licenseNum(licenseYear, customID):

This calculates the output as stated in the question

    output = 100000 * customID + licenseYear

This displays the output

    print("Dog license: "+str(output))

To call the function, make use of: licenseNum(2014, 777)

Where 2014 and 777 can be replaced with other digits as required

Answer: C++

void DogLicense:: CreateLicenseNum(int customID)   {

 

  licenseNum = (100000* customID) + licenseYear;

 

  return;

}

i have been looking for like 20 mins now and cant find the answers to test 3 on edhesive. does anybody have an clue to where i can find it? it is a 20 question test.

Answers

Answer:

Try looking it up. If not, go with your gut!

What size segment will be allocated for a 39 KB request on a system using the Buddy system for kernel memory allocation?A) 42 KB.B) 64 KB.C) 39 KB.D) None of the above.

Answers

Answer:

B

Explanation:

64kb

Match the data types to the types of value they are: Currency, Text, Date/time, and Name.
$500-
10th January 2015-
56,654.09-
Sample.1234-

Answers

$500- Currency
10th January 2015- Date/time
56,654.09- Number
Sample.1234- Text


When do you use online reading tools? Check all that apply.
when there is a word that I do not know how to pronounce
when the text is in a language that I do not fully understand
o when I need to know the meaning of a word
O O O O
O when there are main ideas or details I want to take notes on
when there is information in my reading that I want to look up quickly

Answers

Answer:

the answers are all of them

Answer:

A, B, C, D, E, F

Explanation:

It's any of them. There is no wrong answer.

Got right, on warm up! Hope this helps.

please choose odd one out please tell fast​

Answers

Answer: arrow key

Explanation:

The network team has well established procedures to follow for creating new rules on the firewall. This includes having approval from a manager prior to implementing any new rules. While reviewing the firewall configuration you notice a recently implemented rule but can't locate manager approval for it. What would be a good step to have in the procedures for a situation like this

Answers

Answer:

hello your question has missing options below are the missing options

A. Monitor all traffic using the firewall rule until a manager car) approve it.

B. Immediately roll back the firewall rule until a manager can approve it

C. Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

D. Have the network team document the reason why the rule was implemented without prior manager approval.

answer : Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible. ( C )

Explanation:

A good step to have in the procedures of a situation like this is

Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

Which of the following represented an inch in ancient civilizations?

length from the forefinger tip to its first joint
length from the thumb tip to its first joint
width of a lady’s thumb
width of a forefinger

Answers

Answer:it’s the first one

Explanation:

What do you expect the future trends of an operating system in terms of, cost, size, multitasking, portability, simplicity

Answers

Answer:

Size

Explanation:

thats it thats the answer

Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual which of the following is a possible solution to counteract this one and install any recently added Southward and review to ensure that the recycle bin is empty clear Internet history and cookies and remove any unused files for the desktop three defrag the hard drive or four change the computer power settings to minimal

Answers

Answer:

Clear out unused files

Explanation:

The reason whay the hard drive is so slow is probably because it full of junk. The recycle bin, old update files, cached data, etc. can easily fill up the hard drive, thus slowing it down.

Create a statement that always returns the names of the three criminals with the highest number of crimes committed.

Answers

Answer:

SELECT TOP 3 crimes_committed FROM criminals_and_crimes

Explanation:

Assuming the questions requires an SQL statement, we need to order the list of the criminals by the number of crimes committed.

Let's assume the criminal names are stored under criminal_name and number of crimes committed is stored under num_of_crimes in a list named criminals_and_crimes

We can write:

SELECT TOP 3 crimes_committed FROM criminals_and_crimes

for MySQL.

I hope this answer helps.

Harry has created a Microsoft Excel workbook that he wants only certain people to be able to open. He should use
on the File tab to set a password for the workbook.
Encrypt with Password
Save with Password
Open with Password
Set Password
NEXT QUESTION
ASK FOR HELP
TURN IT IN

Answers

Answer:

Encrypt with password

What is the median of 6, 16, 9, 20, 45, 30, and 32?
A. 9
B. 16
C. 20
D. 22

Answers

I believe the answer to your question is going to be C. 20
Hope this helps:)

how many earths fit in a sun

Answers

My Answer:

1.3 million Earths.

The answer is that it would take 1.3 million Earths to fill up the Sun. It would take so much Earths to fill the Sun because the Sun makes up 99.86% of the mass of the Solar System, so a lot of Earths would be needed to fill up the Sun.

- Elianie ✨

For interface and dialogue designs, one additional subsection is included: a section outlining the dialogue sequence which is ________.
A) The ways a user moves from one display to another
B) A narrative overview
C) A sample design
D) Testing and usability assessment

Answers

Answer:

A) The ways a user moves from one display to another

Explanation:

The interface is the point of interconnection between a user and a system. On the other hand, the dialogue shows the sequence of interactions between a user and a system. In the dialogue section, computation is formatted just like paper-based forms. So, for interface and dialogue designs, one additional subsection is included: a section outlining the dialogue sequence which is The ways a user moves from one display to another.

This additional subsection shows how the user is shifted from one screen to another screen or can say it as " moves from one display to another" and it is carried out for dialogue design and outlining dialogue sequence.

Identify and summarize the three types of programs that can be installed on a computer running Windows.

Answers

Types of Programs

There are two categories of programs. Application programs (usually called just "applications") are programs that people use to get their work done. Computers exist because people want to run these programs. Systems programs keep the hardware and software running together smoothly. The difference between "application program" and "system program" is fuzzy. Often it is more a matter of marketing than of logic.

The most important systems program is the operating system. The operating system is always present when a computer is running. It coordinates the operation of the other hardware and software components of the computer system. The operating system is responsible for starting up application programs, running them, and managing the resources that they need. When an application program is running, the operating system manages the details of the hardware for it. For example, when you type characters on the keyboard, the operating system determines which application program they are intended for and does the work of getting them there.

Some embedded systems do not use an operating system, but run their programs directly on the processor.

Modern operating systems for desktop computers come with a user interface that enables users to easily interact with application programs (and with the operating system itself) by using windows, buttons, menus, icons, the mouse, and the keyboard. Examples of operating systems are Unix, Linux, Android, Mac OS, and windows

Some airports are installing face recognition systems to identify terrorists and criminals trying to enter the country. Statistics show that about one in one million people passing through the airports is a terrorist. Suppose the FAR is about 1 percent. The FRR is about 30 percent. Assume there are 10 million terminal visitors (i.e., people entering the country) at all country's airports. Based on the information provided, calculate the number of terrorists attempting to get in the country through airports, the number of terrorists that would be identified, the number of daily legitimate passengers, the number of passengers incorrectly identified as terrorists. Report your answers to the following table. Note: Some of the numbers are given to you in the exercise. You just need to report them to the table. Number of Terminal visitors FRR FAR Number of Terrorists Number of Terrorists identified Number of Legitimate passengers Number of Passengers incorrectly identified

Answers

Answer and Explanation:

Given the table,

Number of Terminal visitors:

FRR:

FAR:

Number of Terrorists:

Number of Terrorists identified:

Number of Legitimate passengers: Number of Passengers incorrectly identified:

We fill the table,

Number of Terminal visitors: 10,000,000

FRR: 3,000,000

FAR: 100,000

Number of Terrorists: 10

Number of Terrorists identified: 3,000,010

Number of Legitimate passengers: 9,999,990

Number of Passengers incorrectly identified: 3,100,000

Number of passengers incorrectly identified as terrorists : 3,000,000

Note:

1. Number of terminal passengers is 10 million from question(number of passengers entering the country from all airports in the country)

2. The False Rejection Rate(FRR) is the rate of rejection of authorised passengers by the biometric system. It is 30% here. We calculate 0.30*10 million= 3 million

3. False Acceptance Rate(FAR) is the rate of acceptance of unauthorized passengers by the biometric. It is 1% here. We calculate 0.01*10 million= 100000

4. Number of Terrorists is equal to 10 since one in one million people are terrorists. 10 million people would then have 10 terrorists.

5. Number of Terrorists identified: number of terrorists would be number of falsely identified terrorists 3 million + number of terrorists 10 = 3,000,010 ( assuming that all terrorists were identified)

6. Number of Legitimate passengers: number of legitimate passengers = 10 million passengers- number of terrorists 10= 9,999,990

7. Number of Passengers incorrectly identified: number of passengers incorrectly identified is equal to falsely rejected passengers(FRR) 3 million + falsely accepted passengers 100000= 3,100,000

8. Number of passengers incorrectly identified as terrorists is equal to falsely rejected passengers (FRR) =3,000,000

Other Questions
which of these is an example of typing at an average of 42 words per minute Triangle similarity problem PLEASE HELP I WILL MARK YOU BRAINLYEST IF YOU GET ME THE RIGHT ANSWER PLSSSS Question 2The red fire ant is indigenous to South America. In recent years, this invasive species has become a pest for both humans and other antscrop destructionWhat would be the safest way to reduce the impact of the non-native red fire ant while minimizing the impact on other organisms?A pouring gasoline on ant moundsBspraying broad-spectrum pesticidesrelease a species of fly that will prey on the fire antsDtreating all species of ants with ant killer Solve the given system of equations utilizing either the substitution or addition method. how many significant figures does 1700000000 have ? Which group aided the Americans during the Revolutionary War? This is due today!!!!!!!! 03.01 LC)What is the length of the hypotenuse of a right triangle if each of the two legs is 4 units? (5 points)Square root of 8 units4 unitsSquare root of 32 units8 units Help please !!! Due in 10Minutes Cotton candy was first made in Europe during the 17th century, but making it back then took a lot of work, and most people couldn't afforfd it. In 1897 William Morrison and John Wharton invented machine spun cotton candy. This made the treat much cheaper to produce. People fell in love with it when Morrison and Wharton introduced it at the 1904 World's Fair. A. problem and solutionB. chronologyC. compare and contrastD. both choices 1 and 2 are correct help ppppllllllllllllssssssssssss!!points and brainliest! Joyce pushes Efua, whose mass is 40.0 kg, with the force of 5.0 N. What is Efua's resulting acceleration? What does the reduction potential chart tell you about two elements?A. Where they are located on the periodic tableB. Which is more likely to be reducedC. Which forms a positive ionD. Which one is a metal What is the range of the function on the graph?O all real numbersO all real numbers greater than or equal to 0O all real numbers greater than or equal to 1O all real numbers greater than or equal to 2 The bodys main energy source should come from what essential nutrient? A. protein B. fat C. carbohydrate D. minerals ANSWER QUICK I WILL MARK BRAINLEST!!!!!Travis is reading Wonder after school.The thing is, because of the way my face is, people who don't know me very well don't always get that I'm smiling. My mouth doesn't go up at the corners the way other people's mouths do. It just goes straight across my face. But somehow Jack Will got that I had smiled at him. And he smiled back.He is not sure that he understands what he is reading.What will most help Travis understand the paragraph?Travis can look online at pictures of smiling faces.Travis can read an encyclopedia article about mouths.Travis can reread the paragraph and create a mental picture of Augusts smile.Travis can keep reading the story and hope he understands later. whats the slope of (-1,8) and (2, -4) In the given figure, line m is parallel to line n, and line a is parallel to line b. What is the answer for PART A: Which statement best expresses the main theme of the short story? How is the Democratic Party similar in beliefs to the Federalists? Both strongly opposed slavery. Both were formed because of a dispute. Both supported a strong central government. Both were organized on federal and state levels. What is the image of the point (-7, -3) after a rotation of 90 counterclockwiseabout the origin?