Write any 2 differences between implicit variables and explicit variables.​Plz tell :' (

Answers

Answer 1
Explicit is stated very clearly
Implicit is implied
Explicit leaves no room for confusion
Implicit doesn’t have to be directly stated

Related Questions

Don't click on this I am testing

Answers

Don't click on this I am testing... I want the points so.

Answer:

ok

Explanation:

write a qbasic programming to calculate and display the total price of 100 pens if a pen costs Rs.20?

Answers

Answer:

2000

Explanation:

if one pen cost 20 then 100 pen=20×100=2000

Which statement best describes what you would be aware of when you copy or move files from one place to another place?

Answers

Answer: The files are copied from the main folder or destination folder and pasted on another location or folder.

Explanation:

The files can be moved automatically from one folder to another. The files are then can be copied from one folder and pasted on another. The new file destination allows the automatic file renaming. The file can be erased or removed from the previous location. Copying a file is a means of content duplication.

EXPLAINING A URL
URLs specify the location for resources on the Internet.
Examine the following URL and answer the following questions. In the following URL: www.example.com/homepage.html
What is the domain in this URL?
What is the path in this URL?
When this URL is typed into your browser, your browser generates a request based on the URL.
Where does this request get sent?
What kind of machine is listening for this request?
What exactly is the request asking for?
What does your browser expect to receive as a response?

Answers

Answer:

Explanation Below

Explanation:

The URL domain is example.

The URL path is the link itself

The Request gets sent to the web host.

The servers are the machine that gets the request (I’m not sure what you mean so I’m assuming it means that)

The request is asking the web host to connect you to the domain/server.

The last one I don’t really know......

Answer:

I hope this helps!

Explanation:

1. The domain in example.com

2. The path is /homepage.html

3. The request gets sent to the browser, which then sends it to the server.

4. The request is asking for the address that belongs to the server.

5. The browser expects to receive an HTTP response.

Which of the following are characteristics of algorithms? Choose all that apply. They take a step-by-step approach to performing a task. They’re made up of Instructions posted on a website. They break the task into manageable steps. They identify the tasks that will repeat. They can be written in a computer language to create a program for a computer to follow.

Answers

Answer:

They take a step-by-step approach to performing a task.

They break the task into manageable steps.

They identify the tasks that will repeat.

They can be written in a computer language to create a program for a computer to follow.

Explanation:

An algorithm is made up of a series of instructions that have a start point that eventually culminates in an endpoint. It is used in calculations and data processing. Some of the characteristics of algorithms include;

1. They take a step-by-step approach to performing a task. There are well-defined tasks that pass through a series of successive steps before the final culmination.

2. They break the task into manageable steps. There are definite manageable steps that tasks must be broken into to ensure successful execution.

3. They identify the tasks that will repeat and execute them when the program is reading.

4. They can be written in a computer language to create a program for a computer to follow.

Answer:

A). They take a step-by-step approach to performing a task.

C). They break the task into manageable steps.

D). They identify the tasks that will repeat.

E). They can be written in a computer language to create a program for a computer to follow.

Explanation:

I just did the Assignment on EDGE2022 and it's 200% correct!

The first line in a Hypertext Markup Language (HTML) file is the _____, which is a processing instruction indicating the markup language used in a document.

Answers

Answer:

The appropriate answer will be "Doctype ".

Explanation:

Probably the DOCTYPE would not be a component or perhaps an HTML tag. It allows the app or developer to know how and where to view the text, by suggesting the HTML (and perhaps another XML language) edition or specification would be used. A document type specification, or DOCTYPE, seems to be a guideline associating a specific SGML as well as an XML document with either the concept of a document.

A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed through a firewall, for ping to operate correctly?

Answers

Answer:

Internet Control Message Protocol (ICMP) Echo Requests

Explanation:

A system that has Windows Firewall or antivirus or other third party antivirus enabled with their configuration setting set to default, ping command from another device will not be able to see if the device with an enabled firewall is alive.

The ping command sends Internet Control Message Protocol (ICMP) Echo Request to a destination device after the destination device will reply with a Reply packet. However, by default, firewalls, such as Windows firewall blocks ICMP Echo Requests from the external network and pinging will  work when the firewall is disabled or an exception is created that lets ICMP Echo Requests pass through the firewall.

The Internet Control Message Protocol (ICMP) should be allowed through a firewall, for ping to operate correctly.

ICMP (Internet Control Message Protocol) is a protocol that produces error messages to the Internet protocol address.

This error reporting protocol (ICMP) is used for diagnostics and network management.

Any network device using TCP/IP can send, receive, and/or process ICMP messages.

In conclusion, the Internet Control Message Protocol (ICMP) should be allowed through a firewall, for ping to operate correctly.

Learn more in:

https://brainly.com/question/6265069

What operating system does your computer use?What operating system does your computer use?

Answers

Explanation:

An operating system is simply software that abstracts the hardware allowing a computer user to access computer resources in a meaningful way.

The three main operating systems used by consumers are Windows, MacOS, and Linux.

Cheers.

ATM machines respond to request in__________​

Answers

Answer:

Atm machine respond to request in atm card

ATM machines respond to requests in ATM card.

What is an ATM Machine?

ATM simply known as Automated Teller Machine is an electronic machine used by financial institutions to perform financial transactions. It is an automated banking operation which does not require the effort of man.

ATM card is a payment card that is issued by a financial institution which enables a customer to access their financial accounts through the automated teller machine (ATM) and other point of purchase transactions.

Hence, the ATM card gives commands to the ATM machine.

Read more on atm machine:

https://brainly.com/question/24471380

#SPJ2

What are some things you can do to clean up your digital footprint.

Answers

Answer:

Clear your search history and erase your IP address.

Explanation:

Throw your router out a 2-Story window. It's simple. Now go commit not alive.

You're done!!

How does Google work, why does it work that way?

Answers

Answer:

Google uses automated programs called spiders or crawlers, just like most search engines, to help generate its search results. Google has a large index of keywords that help determine search results. ... Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

Answer: Google uses automated programs called spiders or crawlers, just like most search engines, to help generate its search results. Google has a large index of keywords that help determine search results. ... Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

Explanation: Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. ... Google references this index when a user enters a search query.

Hope this helps^^

Miguel, your system administrator, warns you of a new virus threat. This particular virus changes forms to avoid detection by antivirus software. What type of virus is it?

Answers

Answer:

I think it is Polymorphic virus.

_is a computer network created for an individual person

Answers

Answer:

Personal area network

Explanation:

is correct 100% sure

OS is a mediator between hardware and user

Answers

Answer:

Os is a set of programs that manage computer hardware and application software.

Explanation:

Operating system as the mediator between that hardware and the software to the program in input output process.

Os share the input output between program to the using the central processing unit, and they generated by the output input control.Os is the there are two types:- (1) application software (2) system software.(1) Application software that program to manage the computer operation.(2) System software the program to user perform a task in particular way.Os communicate to the computer to know the computer language, operating system developed to the manage storage.Operating system to allow the access and file system to the network security  that program execution and protected mode.Operating system to contain that information and resource to the system protection.Operating system hardware and user to manage the virtual management  and resource allocation.

Running the processor faster than recommended by the manufacturer is called _____ . This can increase performance and speed, but will also void the manufacturer warranty.

Answers

Answer:

overclocking.

You should check your cooling when doing this, otherwise you can burn your processor.

Spyware is unwanted and often unsolicited messages. It is not technically malicious software, but can have a serious negative effect on IT infrastructures through sheer volume.

a. True
b. False

Answers

Answer:

The answer is "Option b".

Explanation:

The given statement is false because the spyware is a malicious program, that infects its device, and steals access to systems data from its web, and the spam also isn't technically malicious, but it could have a serious negative impact through density on the networks, and it is also junk message, which is web slang for an email message, which is primarily unsolicited email.

What should you do if you copy a sentence from a book into a document
you are writing for your employer?
A. Ask your boss to read the document.
B. Give credit to the author for the work you used in your document.
C. Check the spelling of your document.
ОА
OB
Ос
HINT
SUBMIT
PREVIOUS
5 of 18
here to search
A
The

Answers

Answer:

Your answer is going to be B

What technique do API developers most commonly use to limit access to an API to authorised individuals and applications?

Answers

Answer:

API keys

Explanation:

API (Application Programming Interface) is a computing interface that defines the interaction between multiple software intermediaries.

API key is a specific identifier use authenticate the developer user and call programs for the API.

The API keys often serve as a specific identifier and a secret token for authentication, and usually have a set of access rights to the API associated with it.

These are commonly used to authenticate a project with an API instead of a human user. Different platforms can execute and use API keys in different ways.

Someone hacked into an employee's computer and erased all of their data. All data for the past three weeks was lost as that was when the employee last performed a backup. Which type of network is the company more than likely using?

Answers

WWW/ World Wide Web.

The Google brand name appears on thousands of websites due to its ________ API. Select one: a. proprietary b. open source c. closed source d. user-controlled

Answers

Answer: open source

Explanation:

Typically, most applications that we run on our computer usually consist of a user interface. An application programming interface is also just an interface, which is not meant for users but rather applications.

The Google brand name appears on thousands of websites due to its open source API.

In your own words, describe what Internet Protocols are. Why is it important to have agreed upon protocols?

Answers

Answer:

Internet Protocol refers to a set of rules that govern how data packets are transmitted over a network. Internet protocol describes how data packets move through a network. Its important to have agreed upon protocols because Computers make use of protocols as well, to enable them to communicate. Devices need to communicate. When two devices want to successfully communicate, they must agree to follow some rules about the way they will do it.

Answer:

Internet Protocols allows allows devices to connect and communicate on the Internet.It is important to have agreed upon protocols because it makes it possible for different network components to work together.

BRAINLIST PLS!

How many steps are there on Mail Merge Task Pane? List them.​

Answers

Answer:

There are six steps in the Mail Merge Task Pane.

Select the document type. Start the document. Select recipients. Write your letter. Preview your letters. Complete the merge.

Explanation:

Mail Merge is a handy feature that incorporates data from both Microsoft Word and Microsoft Excel and allows you to  create multiple documents at once, such as letters, saving you the time and effort of retyping the same letter over and  over.  

"A machine is having issues, so the user is responsible for getting the machine serviced. Which stage of the hardware lifecycle does this scenario belong to?"

Answers

Answer:

Maintenance

Explanation:

The maintenance stage of an hardware life-cycle involves the servicing, repair replacement of machine component activities as well as other restorative activities meant to restore the machine to its original state.

The stages of an hardware life-cycle are;

1) Planning for the required hardware

2) Buying or leasing the hardware

3) Hardware installation

4) Maintenance activities, Repair

5) Hardware upgrading

6) Extend

7) Hardware trade in or buyback

8) Disposal of the hardware

Lionel wants to find images of colonies of Emperor penguins to use for a school project. Which of the following phrases should he use as the search query to find the results he needs?

a. Emperor penguins
b. Penguin colony
c. Emperor penguin large group
d. Emperor penguin family

Answers

Answer:

d. Emperor penguin family or b. Penguin colony

Surrendering to digital distractions will likely result in learning more material. O False True​

Answers

Answer:True

Explanation:

A computer professional who designs ways to organize, store, and retrieve data is a database .

Answers

Answer:

Database Designer

Explanation:

Database design means organization of data as per the database model. The database designer what data should be stored and how the various data elements interrelate.

A database designer designs database design that includes indexes, tables, constraints, views, procedures, triggers and other constructs needed to store, retrieve and delete persistent objects.

One can become a database designer by following the below mentioned steps:

Earn a Bachelor's Degree in a Related Field Or Gain Foundational Training.

First earn a Bachelor's degree

Gain real world database development experience.

Acquire IT Database certifications and develop Soft Skills

utility software is also known as _____​

Answers

Answer:

Utility programs

what word matches with this
“Storage Device that contain all the
computer programs and documents”

Answers

Answer:

"Backup Drive"

Explanation:

Advanced persistent threat (APT) attackers want to ________. Select one: a. create awareness for their causes b. remain unnoticed so they can continue to steal data c. conduct cyberwarfare d. reveal weaknesses in business and government websites and then force them offline

Answers

Answer:

Option b (remain unnoticed so they can continue to steal data) is the right approach.

Explanation:

APT seems to be sustained but instead designed to target coordinated attack whereby an attacker achieves network access including a longer length of time impossible to conceive.Usually, APT assaults become targeted at organizations throughout fields including such national security, engineering, as well as the financial services industry, as they make increased-value details.

There are 3 other possibilities not relevant to just the given case. So that the option here was the right one.

Which of the following is true about ethical issues in graphic design?
A. Ethical issues force designers to create unbiased designs.
B. Unethical behavior rarely occurs in the graphic design industry.
C. Closely imitating the work of another designer is considered unethical.
D. Understanding ethical issues reduce the amount of design work that is plagiarized.

Answers

Answer: The Answer Is B

Explanation:

I Did It On Edge

It should be B) Unethical behavior rarely occurs in the graphic design industry, i got it right on Edge

Also im sorry im a month late

Other Questions
In your journal, go into depth on 12 specific areas from this novel. Create a separate page for each 1. Author/Title List the author and title of the novel. 2. Setting Identify where and when the author is writing about. 3. Main Characters Include a brief description that thoroughly describes him/her. 4. Minor Characters Describe their relationship to the main character. 5. Conflicts Determine the problem the characters encounter. 6. Climax/Resolution Explain in detail the climax and resolution of the novel. 7. Timeline Include 10 major events that detail the beginning, middle, and end of the novel. 8. Theme Determine the moral or message the author is trying to relay throughout the plot of the novel. 9. Vocabulary Make a list of five to ten new words you learned, along with their definition and/or context clues from the novel. 10. Figurative Language Lots to choose from here: Think simile, metaphor, alliteration, personification, onomatopoeia, hyperbole. Pick three and explain. 11. Genre Was the novel fiction, nonfiction, fantasy, autobiography, etc.? How do you know? Give an example from the story to prove your point. 12. Opinion did you think the author did a good job holding your interest? Give three specific reasons some one should or should not read this book. does this mean I have to make 12 pages with answers to these questions Use the diagram below to answer questions 1-6. All rooms are rectangular. 1. What is the value of side A? Explain your thinking. 2. What is the value of side B? Explain your thinking. 3. What is the value of side c? Explain your thinking. 4. What is the area of the vegetable garden? Show your thinking Briefly define and explain the differences between nature and nurture (GENERAL PSYCHOLOGY QUESTION BTW !!!!!!). List the 3 function of the atmosphere What correctly describes the attitude of most English settlers had toward the Native Americans and their way of life? 12 to the 16th power over 12 to the 4th power simplified. In my research, I found that the levels of "gonadotropins" in the body are critical to understanding how the drugs Clomid and Ortho Tri-Cyclen work. What are gonadotropins? What role do they play in fertility? In the mean time, one of the principal effects of those discoveries has been, to raise the mercantile system to a degree of splendour and glory which it could never otherwise have attained to. It is the object of that system to enrich a great nation, rather by trade and manufactures than by the improvement and cultivation of land, rather by the industry of the towns than by that of the country. . . .Two new worlds have been opened to their industry, each of them much greater and more extensive than the old one, and the market of one of them growing still greater and greater every day. Adam Smith An Inquiry Into the Nature and Causes of the Wealth of Nations An economic consequence of the material wealth returned to Europe due to colonization and exploration was A - increased upward mobility for lower-class citizens. B - a greater reliance on industry rather than agriculture. C - increased government spending on public works initiatives. D - high unemployment, as wealth shifted from goods production to the financial sector. Describe the walls of Antelope Canyon. How was Antelope Canyon made? Why is water vapor invisible? How is rain formed in desert/canyon? PLEASE HELP 15 POINTS! Which of the following can be used to rewrite the expression (3)(2+c)? There are two correct answers. A) Commutative Property of Multiplication B) Associative Property of Addition C) Associative Property of Multiplication D) Commutative Property of Addition M ugh answer is D but I'm not so sure. Your bank account is $32.00. You make the following withdrawals, in the following order: $15.00,$7.41,$35.79, and $ 0.53. After each withdrawal that leaves a negative balance, the bank adds a -$32.00 bank fee to your account. what is your new balance? Factor z^2 81z^2-81= A car uses 150 litres of petrol in 45 minutes. How many litres of petrol will it use in 1 hour? this is my third time posting this bc i kept getting the wrong answer please help me PLEASE HELP I AM GIVING MORE POINTS THAN I SHOULD PLEASE HELPWrite the equation of the parabola in vertex form. vertex (4,1), point (3,-1) 1. The ratio of boys to girls in the seventh grade is 2:3. If there are 24 boys, how many girls are there? given P(x)=x^2+x+1 find answer P(7) 3. Ann wants to paste 18 posters on her bedroom wall. She wants to put the samenumber of posters in each row. How many rows could Ann make, 4.5, 9 or 10? What proposal was at the heart of the Virginia Plan? a. Establishing three branches of government, with the strongest being the executive branch and the president having the most power in appointing all members of other branches b. Amending the Articles of Confederation to strengthen the national government and weaken states' representation in Congress c. Establishing three branches of government, with the strongest being the legislative branch, which would consist of two houses and would choose the executive and judicial branches d. Amending the Articles of Confederation to strengthen the national government and still protect the interests of small states