Program code that can be evaluated to a value is called a(n):__________

Answers

Answer 1

Answer:

The answer is "expression"

Explanation:

An expression is a term or phrase, which is commonly used to transmits certain concepts, perceptions as thoughts. It is a mixed form of more than one operands, which is used to determines the values. It is a legal symbol, that combines the representing word like, operators, constants, and variables, that is arranged by language law.  

please find the attachment for example.

Program Code That Can Be Evaluated To A Value Is Called A(n):__________

Related Questions

Which of the following tasks is an interactive media professional most likely to do? Check all of the boxes that apply. 1. decide how a website should look 2.install an art-design–oriented software program for other users 3. monitor the network connection 4. test a software program to ensure that the visual elements are working 5. set up a new computer for the president of a company

Answers

Answer:

decide how a website should look and  

test a software program to ensure that the visual elements are working

Explanation:

Answer:

A,D

Explanation:

The person above was right

Question: 8
Which of the following is a benefit of the fault-tolerant nature of Internet routing?
The ability to use a hierarchical naming system to avoid naming
conflicts
The ability to provide data transmission even when some connections
between routers have failed
The ability to resolve errors in domain name system (DNS) lookups
The ability to use multiple protocols such as hypertext transfer
protocol (HTTP), Internet protocol (IP), and simple mail transfer
protocol (SMTP) to transfer data.

Answers

Answer:

The ability to provide data transmission even when some connections

between routers have failed

The statement which represents a benefit of the fault-tolerant nature of Internet routing may include the ability to provide data transmission even when some connections between routers have failed. Thus, the correct option for this question is B.

What is Internet routing?

Internet routing may be defined as the process of transmitting and routing IP packets over the Internet between two or more nodes. It is identical to standard routing methodologies but incorporates packet routing techniques and processes on external networks or those that are hosted or Internet-enabled.

The fault-tolerant nature of Internet routing determines a benefit in the capability to deliver the transmission of data even when some connections between routers have failed without any disconnection and disturbances. Through this process, the selection of a path for traffic in a network or between or across multiple networks has been successfully carried out.

Therefore, the correct option for this question is B.

To learn more about Internet routing, refer to the link:

https://brainly.com/question/24812743

#SPJ5

Explain the four basic operation performed by every computer​

Answers

Answer:

computer is a machine that, under a program's direction, performs four basic operations: input, processing, output, and storage. A program is a list of instructions that tells a computer how perform the four operations.

Answer:

A computer is a machine that, under a program's direction, performs four basic operations: input, processing, output, and storage. A program is a list of instructions that tells a computer how perform the four operations.

Explanation:

how many 16ths are in 3/8 of an inch

Answers

Answer:

0.375

Explanation: i think

Which type of evidence should victims collect to help officials catch cyber bullies

Answers

Answer:

(c)social media usernames

Explanation:

The type of evidence should victims collect to help officials catch cyber bullies is social media usernames.

What do you mean by the cyber bullies?

Cyberbullying is when someone is harassed, threatened, or intimidated through a cell phone, instant messaging app, email, or social networking sites.

Children frequently engage in cyberbullying because they have access to these technologies at an earlier and earlier age.

Cyberbullying victims may have a variety of negative consequences, such as mental health problems, subpar academic results, a desire to quit school, and even self harm thoughts.

Bullies themselves at a higher chance of developing problems like drug abuse and engaging in violence.

Therefore, the  type of evidence should victims collect to help officials catch cyber bullies is social media usernames.

To know more about the cyber bullies, visit:

https://brainly.com/question/4689569

#SPJ2

How do you add a section break that would start the new section on the same page?

Answers

Leave a line and that will make a section break

Answer:

Click the Page Layout tab, click Breaks, and choose Continuous.

Does this photo look good? I took it myself for photography class

Answers

Yep it looks good :)
AMAZING! I LOVE IT! IT'S AWESOME!

9
How many total numbers can be represented with an 8-bit binary (base-2) system?
А. 127
В. 12В
Ос. 255
OD. 256

Answers

Answer:

D:256

Explanation:

Trust me

Answer:

The correct answer is 256

Explanation:

2^0=1

2^1=2

2^2=4

2^3=8

2^4=16

2^5=32

2^6=64

2^7=128

1+2+4+8+16+32+64+128=255, but 00000000(which is 0) also counts as a number, so the answer is 256.


Which character is often used to identify registered trademarks and is available on the Insert tab and Symbols group?

Answers

Answer:"TM"

Explanation:

Answer:

TM

Explanation:

because its used to identify, trademarks and etc. mark brainliest! i also got 100 on the quiz

How do you clean and maintain a mouse, keyboard, optical drive, computer display, and printers?

Answers

Answer: Mouse: to clean a traditional Mouse twist the plate that holds the ball and remove the ball then use a damp cloth to wipe the ball played and the surfaces and edges of the mouse to clean it Optical Mouse use the damp cloth to wipe the upper and lower surface of the mouse the lands area and ages of the mouse.

Keyboard: first shake the keyboard after turning it upside down to remove the does that might have accumulated in the slots and Cavities use a compressed air spray to blow away the contaminant between the keys of a keyboard. In addition spray with disaffected and wipe the keyboard throughly to remove all germs.

Optical drives: after a long. Of use the laser on an optical drive gathers dust and dirt therefore uses lens cleaner disc to remove contaminants from the laser in addition remove the optical drive in clean the tray with a damp cloth finally use a dry cloth to dry the tray before placing it back in the drive.

Computer display: to clean an LCD monitor use soft dip cotton cloth to gently wipe the screen if the computer display has a CRT screen dampen a cloth with the glass cleaner and gently wipe away the dirt from the screen.

Printers: use a damp cotton cloth to clean the inner and outer surfaces of the printer if there are cleaning Buns on the printer used in forehead cleaning and Cat cartridge cleaning in case he's cleaning buttons are not present when the computer contact the printer vendor for accurate directions to clean it.

Explanation: Here are some of the procedures that I would used to keep the peripheral devices clean.

html use for web page deaign true or false​

Answers

PLEASE GIVE BRAINLIST

False

HOPE THIS HELPED

After spending a year in India, Giovanna returns home to the United States and is inspired to raise money to help her new friends build a school. She makes a pitch to the Rotary Club in her hometown. This was the best experience of my life. Not only did I get to learn about a new culture and explore new ideas, but I am learning to speak their language. But don't just take my word for it. I've asked the children to join us today from India through web-conferencing, and they'd like to say a few words. Giovanna is using digital communications in a civic-minded way to improve the conditions of people in other countries. demonstrate the language of the children of India. increase her chances of getting into a top-notch college. do away with the digital divide

Answers

Answer: A) Improve the conditions of people in other countries. :)

How do I persuade my parents to allow me to have social media? I will be 15 in a week or so, so I am old enough. I'm pulling my grades up, I help around the house, I am in honors classes, I help my siblings out with school, I help make dinner, I just help a lot. What should I do?

Answers

Answer:

my explanation is above my comment :)

Explanation:

Which of these jobs would be most appropriate for someone who majors in information systems?

Answers

Answer:

An Architect, System Designers, IT business analysts etc...

Explanation:

Answer:An Architect and System Designers someone who studies complex work

Explanation:

Audiovisual means that a presentation combines film and photos.
true or false?

Answers

Answer:

False

Explanation:

Using both sight and sound.

Its false , as audio means it should have music or sound tracks in it.

answer im timed i'll mark brainliest
Robert is creating a newsletter in Word and needs to have the ultimate flexibility on the placement of images and text. Which component is treated like an image but still allows free-flowing text? shapes styles pictures text box

Answers

Answer:

The answer is shapes.

Explanation:

Answer:

D: Text box

Explanation:

What is network topology​

Answers

Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks.

I hope it helps!

Answer:

By definition "Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks."

There are multiple types of network topology that all have different purposes, but they all fall under the same general thing as mentioned above. If you're doing a course about this you'll learn much more in detail about it.. It's way too much to describe here on Brainly so feel free to do some research of your own as well!

Hope this helps and have a nice day!

Which explains extrinsic motivation? motivation in which there is a reward motivation that is personally satisfying motivation that is personally meaningful motivation in which the subject is interesting

Answers

Answer:

Motivation in which there is a reward.

Explanation:

Hope this helps God Bless.

The one that explains extrinsic motivation is motivation in which there is a reward. The correct option is a.

What is extrinsic motivation?

Extrinsic motivation is characterized as an incentive to engage in an activity based on achieving an external goal, winning a competition, gaining acclaim and approval, or receiving a prize or cash.

The extrinsic incentive includes things like getting paid to complete a task. Even though you might prefer to spend your day doing something else, you are motivated to go to work because you need the rewards from your job to pay your bills.

In this case, your ability to pay for your everyday expenses serves as your extrinsic motivation. Such a desire or incentive is intrinsic if the reward is inherent in the job. However, if the reward is said to be unrelated to the position, the motivation is said to be extrinsic.

Therefore, the correct option is a, motivation in which there is a reward.

To learn more about extrinsic motivation, refer to the link:

https://brainly.com/question/1658150

#SPJ6

Language: JAVA Can someone please tell me what the problem to my "main" class is?

I included the errors I received when trying to compile as well as the "Student" class which is used to answer the problem.

Here's the expected output:
Bob : 1234
Sue : 5678
Pat : 2468
Then it accepts user input: Chris

Then it outputs the updated objects:
Bob : 1234
Sue : 5678
Pat : 2468
Chris
Bob : 1234
Sue : 5678
Chris : 2468

Answers

Answer:

please find the attachment of the correct code:

Output:

Bob : 1234

sue : 5678

pat : 2468

please enter a name to replace with pat:  

Chris

Bob : 1234

sue : 5678

Chris : 2468

Explanation:

In this code, when we create the class object, that is "stu1, stu2, and stu3" and call the parameterized constructor bypassing the "string and integer" value and print the object value you forget to call the "tostring" method because it is the only method which returns both "string and integer" value.  

A _____ describes two or more computers connected to each other.

computer network

client

server

switch

Answers

Answer:

C

Explanation:

computer network

How globalization is related to communication technology?

Answers

Answer:

hey mate there is your answer

The user enters a URL into a web browser, the web browser sends the information to the DNS server to look up the IP address, then the IP address is sent to the web (host) server. What is the final step in the DNS process?

A) The client sends a request to the DNS server.
B) The DNS server the IP adress back to the URL.
C) The process starts over back at the beginning.
D) The web server sends information back to the web broswer.

Answers

The final step in the DNS process is The web server sends information back to the web broswer.

What occurs when you enter a URL in one's browser?

Note that if you enter a URL into a web browser. The browser is said to search for the IP address for the domain name through the use of DNS.

Furthermore, The browser then sends a HTTP request to the server and the server is known to also sends back a HTTP response back.

Learn more about web browser from

https://brainly.com/question/18455725

Alexis wants to learn HTML and CSS. She wants to test your coding skills in these design languages how can she practice code writing abilities?

Answers

She can use a text document to edit HTML files. Hope it helped!
Thank You!

Some fashion designers use this type of technology to produce clothing.

Select one:

a. 3-D printing

b. dot matrix printing

c. color printing

d. inkjet printing

Answers

Answer:

The answer is A. 3-D printing.

Explanation:

As with other industries, 3D printing in fashion offers clothing manufacturers the chance to produce prototypes and final products in a way that saves time, money and manpower. 3D printing in the world of fashion is still very much in the primary stages, but it's certainly something to watch.

how many types of fundamental movement are there

Answers

Answer:

12

Explanation:

Design a webpage on Artificial Intelligence /Augmented Reality. please help me out with these computer programming

Answers

Answer:

Using HTML, CSS, and Javascript to create the layout, style it, and program the blog's interactivity respectively. Or use Wordpress without codes.

Explanation:

Designing a blog or a website requires certain knowledge or tools. Programmers use tools like HTML, CSS, Javascript, and other front-end libraries and back-end web frameworks. HTML is used to mark-up the web layout, CSS is used to style beautify the page while Javascript is used to make the page interactive.

Other tools like Wordpress requires little or no skill, since the layout of the webpage is drag and drop and other back-end features can be programmed to it.

Fill in the blank with the correct response.
People in STEM careers are considered
thinkers who reach conclusions through sound judgment and reasoning
Save and Exit
Next
What goes in the blank between considered and thinkers

Answers

Answer:

logical

Explanation:

Answer:

logical thinkers

Explanation:

they are logical thinkers because they know whats going on

Which features can Danica use to fix the issue

Answers

Answer:

Hope you uderstand this answer

The process of images displayed on the screen that enables the user to interact with the computer is called what?
Time-sharing
Networking
Graphical user interface
Program execution

Answers

Graphical user interface. An user interface is what the user sees and interacts with. Graphical is related to images.

What is the difference between operating systems and application software?
* Application software translates itself into language for the BIOS, whereas operating systems are what users
interact with
Application software is what the user interacts with, and operating systems are what translate application
software.
Application software is located within the hardware, and operating systems are what the user interacts with.
Application software is located within the hardware, and operating systems are what translate application
software for the BIOS.

Answers

Answer:

Application software is what the user interacts with, and operating systems are what translate application software

Explanation:

The difference between the operating system and the software is that the application system has user interaction and the operating system has a translate application. Hence option B is correct.

Waht is a opering system  ?

An operating system is software that manages the computer hardware and software resources and also provides the services to the computer program. The operating system works on the basis of time-sharing and schedules the tasks for efficient allocation of time.

The application software is based on the application that is developed by the company such as Microsoft or adobe.

Find out more information about the operating system.

brainly.com/question/1763761

Other Questions
What purpose did art serve in earlyhuman society? Homeowners insurance gives you both property and liability protection. THERE ARE 4 GROUPS OF HUMAN DEVELOPMENT. NAME ONE OF THE GROUPS AND LIST 2 MAJOR FACTS OR ADVANCEMENTS THEY MADE. Since Allura Red is red in color, why did we choose to use monitor the wavelength of 470 nm? does allura red transmit or absorb red light ? Use integration by parts to evaluate the indefinite integral[ 2x sin(c) dx Why did I get this question wrong? Name the 2 types of labor systems in American colonies. Demi traveled 480 miles in 6 hours. What was her average speed in miles per hour? Write the noble gas configuration for nickel The Navy Pier Ferris Wheel in Chicago has a circumference that is 56% of the circumference of the first Ferris wheel built in 1893. The Circumfrence of the Navy Peir wheel is 439.6 ft. What is the radius of the first ferris wheel? Is 'compare' as in sources, one of the 5 listedOTrueO False What value of x that satisfies the equation 7/n=8/7 Help ASAP please and explain why ?! I REALLY NEED THIS!! How does Madison respond to the claim that the Constitution created a national rather than a federal form of government? What different aspects of the Constitution does he consider in responding to that claim? what is the reciprocal of 15 1/4 Voltaire called forfreedom of speech.equality under the law,morality in governmenta proletariat revolution. which group requires a caloric range of 1800-2400 calories per dayA.teen boysB.teen girls C.male adultsD.nursing women How is the word protection different from the word protect?O Protection is a noun, while protect is an adjective.Protection is a noun, while protect is a verb.O Protection is a verb, while protect is an adverb.Protection is a verb, while protect is a noun. choose the congruent angles on the triangle shown below Synonym for the word "Domestic"