A __________ constant is a name that references a value that cannot be changed while the program runs.

Answers

Answer 1

Answer:

Explanation:

A constant is a name that references a value that cannot be changed while the program runs

Example in Javascript:

const x = 5;

cannot be reassign x

wronged: x = 10; (will throw an error try to assign value to constant variable)


Related Questions

What are the uncertainties in intrusion analysis known as?

In real-time situations, the intrusion detection systems can only capture the indications of the attack. They fail to ascertain whether an attack has occurred. The uncertainties in intrusion analysis are called

______ uncertainties

Answers

The uncertainties in intrusion analysis are called threats or  suspicious activities.

What does intrusion detection system detect?

An Intrusion Detection System (IDS) is known to be a type of monitoring system that helps one to be able to find out any form of suspicious activities and brings about a form of alerts when they are found.

Note that because of these alerts, a security operations center (SOC) analyst or any form of incident responder can look into the problem and take the right actions to keep the threat in check.

Learn more about  intrusion analysis from

https://brainly.com/question/10848561

Answer: dynamic

Explanation:

I got a 100 on the test

Top/Bottom Rules allow a user to apply conditional formatting to cells that fall within the top or bottom numbers or percentile. How many items will it allow the user to include in the rule?

the top or bottom 10 items or top or bottom 10% only
the top 10 items and top 10% only
the top or bottom 100 items only
any logical number of items or percentages in top or bottom value frames

Answers

The numbers of  items that the user can include in the rule is the top or bottom 100 items only.

What is Top/Bottom Rules?

Top/Bottom Rules is known to be a rule where there is a premade form of conditional formatting which is often used in Excel to alter the set up  of cells in a range.

Note that the Top/Bottom Rules will allow a user to make changes to the top or bottom 100 items only as it only pertains to things that are up and those that are at the bottom.

Learn more about Top/Bottom Rules from

https://brainly.com/question/1862654

A network administrator is importing a list of certificates from an online source, so that employees can use a chain of trust and communicate securely with public websites. Which type of certificates are the network administrator currently importing

Answers

The type of certificates that the network administrator is currently importing is Root.

What do root certificates  mean?

Root certificates are known to be the backbone of any form of authentication and security in the area of software and also usually in  the Internet.

Note that they are often  issued by the certified authority (CA) and can also be  verified by its owner and as such it is the best for the network administrator  to use.

Learn more about certificates from

https://brainly.com/question/24931496

What is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages, many of which contain hoaxes or other undesirable contents such as links to phishing sites

Answers


I think the answer is spam

Your network performs a full backup every night. Each Sunday, the previous night's backup tape is archived. On a Wednesday morning, the storage system fails. How many restore operations would you need to perform to recover all of the data

Answers

The numbers of restore operations would you need to perform to recover all of the data is 4.

What does restore files implies?

Data restore is known to be the act  of copying a backup data from a secondary type of storage and putting it back to its formal location. One can also use a new location for the data.

Note that a restore is only carried out to replace lost data and doing it 4 times is the right numbers of restore operations that  you need to perform.

Learn more about restore operations from

https://brainly.com/question/25753324

Answer: One

Explanation:

Which of the following media forms is the Federal Communications Commission able to regulate content on?
a. FM radio
b. AM radio
c. television stations
d. the Internet
d. satellite radio

Answers

Answer:

-FM radio

-AM radio

-television stations

Explanation:

Telecommunications networks include within an organization.

Answers

Answer:

Computers and Telephones

Explanation:

Right on Edge 2022

Answer:

D. Computers and Telephones

Explanation:

E2020

Post-production editing can only occur on a Mac computer, not a PC.
True
False

Answers

Answer:

false there is no real difference that would affect post production

A search expression entered in one search engine will yield the same results when entered in a different search engine.
A. True
B. False

Answers

Answer:

false

Explanation:

Consider the following instruction mix: R-type I-type (non-lw/sw) Load Store Branch Jump 24% 28% 25% 10% 11% 2% a. What fraction of all instructions use data memory

Answers

Based on the number of instructions that use Data memory, the fraction of instructions that use data memory is 35%.

Which instructions use data memory?

The instructions that use data memory in the above table are Load and Store.

This means that the fraction is:

= Store + Load

Solving gives:

= 10% + 25%

= 35%

Find out more on executing instructions at https://brainly.com/question/26949355.

(50 pts) To preview a presentation, switch to Slide Show view.


A) True

B) False

Answers

Answer: Your answer is indeed true

True

Hpe this helped you. my cats name is Smiles.

Answer:

TRUE

Explanation:

Select the Slide Show tab.

Select the Use Presenter View checkbox.

Select which monitor to display Presenter View on.

Select. From Beginning or press F5.

A ____ is a software program that is designed to cause damage to a computer or perform some other malicious act.

Answers

Computer virus, a software program that is designed to cause damage to the computer system or perform some other
malicious act

What is a program that migrates through networks and operating systems, typically attaching themselves to different programs and databases?.

Answers

A software program that migrates through networks and operating systems (OS) by attaching themselves to different programs and databases is a: virus.

What is a virus?

A virus can be defined as a harmful or malicious software program that is designed and developed to migrate through networks and operating systems (OS) of a computer (host), especially by attaching themselves to different programs and databases.

This ultimately implies that, a virus is a malicious software program which causes damage to a computer and user files, if not detected and properly managed.

Read more on virus here: https://brainly.com/question/26128220

D. It's based on command and control models
5. The best way to support the growth of social media in your organization is to:
A. Develop a social media policy and strategy
B. Allow anyone in your organization to post on your organization accounts
C. Only repost/share information from other organizations in your organization accounts
D. Only post on your accounts during an emergency

Answers

The best way to support the growth of social media in your organization is to Develop a social media policy and strategy.

What is Social media policy?

A social media policy is known to be the rules and regulations that are used in policing the use of social media.

Conclusively, They help to give advise to any person, etc. who is acting as a representatives of a firm on the right use of social media and thus the  The best way to aid the growth of social media in your firm is to develop a social media policy and strategy.

Learn more about social media policy from

https://brainly.com/question/3653791

A company notices their software is prone to buffer overflow attacks. They choose a popular development environment, Microsoft Visual Studio, to help avoid future attacks. What development environment feature would most help the company avoid future buffer overflows

Answers

Answer:

Compiler Option

Explanation: These help prevent buffer overflow attacks

You will read in two strings from a file cp4in_1. Txt at a time (there will be 2n strings, and you will read them until EOF) and then do the following. You alternately take characters from the two strings and string them together and create a new string which you will store in a new string variable. You may assume that each string is no more than 20 characters long (not including the null terminator), but can be far less. You must use pointers. You may store each string in an array, but are not allowed to treat the string as a character array in the sense that you may not have statements like c[i]

Answers

Use the knowledge in computational language in C++ to write the  a character array .

How to define an array in C++?

An Array is a set of values ​​arranged in lists and accessible through a positive numeric index. So, we have that each position of our Array is a variable of the type of our Array, so we have to have a way to initialize this set of variables.

So in an easier way we have that the code is:

#include <stdio.h>

#include <studlib.h>

int main()

{

File*fp;

fp=fopen("cp4in_1.txt","r");

char ch;

//while(1)

//{

while(!feof(fp))

{

char *s1,*s2,*s3;

s1 = (char*)malloc (20 *sizeof (char));

s2 = (char*)malloc (20 *sizeof (char));

s3 = (char*)malloc (20 *sizeof (char));

int i=0,j=0,x,y;

while(1)

{

ch=getc(fp);

if(ch=='\n')

break;

*(s1+i)=ch;

i++;

}

while(1)

{

ch=getc(fp);

if(ch=='\n')

break;

*(s2+j)=ch;

j++;

}

for(x=0;x<i;x++)

{

*(s3+x)=*(s1+x);

}

for(y=0;y<j;x++,y++)

{

*(s3+x)=*(s2+y);

}

for(x=0;x<i+j;x++)

{

printf("%c",*(s3+x));

}

printf("\n");

getc(fp);

}

}

See more about C++ code at brainly.com/question/19705654

flexibility
user control
mouse-free input
text alternatives
balance
enabling the user to change the font
and other elements on the page
enabling navigation for visually
impaired users who may rely
only on keyboards for pointing
and clicking
allowing blind users to understand
website images and video
allowing a web page to adjust
to different devices and screens

Answers

Hello!

The answers are:

-User control: enabling the user to change the font and other elements on the page.

-Mouse-free input: enabling navigation for visually impaired users who may rely only on keyboards for pointing and clicking.

-Text alternatives: Allowing blind users to understand website images and video.

-Flexibility: Allowing a web page to adjust to different devices and screens.

I hope that this helps you out!

What are you doing to an image when you manipulate it?
A. downgrading the integrity of the image

B. creating a digital footprint of the image

C. digitally altering it

D. erasing the intrinsic data

Answers

Answer:

c digitally altering it

The Rubik's Cube has been challenging, inspiring, and frustrating Americans for over 30 years. It has more than 43 quintillion possible combinations but only one solution!
TRUE OR False

Answers

False because there is many different way to solve it like CFOP, Roux and ZZ

What different mechanisms could make the grain crusher work?

Answers

The post-cyclic behavior of biogenic carbonate sand was evaluated using cyclic triaxial testing through a stress control method under different confining pressures between 50 to 600 kPa

A/an _____________ is a stored program that executes at a specified time. Group of answer choices stored procedure view trigger event

Answers

There are different kinds of program. A/an event is a stored program that executes at a specified time.

What is a Stored Program?

This is known to be a program that is made up of one or plenty SQL statements that are saved in the database for future use.

The Four types of stored programs are:

Stored ProcedureStore FunctionTrigger Event

Conclusively, An Event is a program that is Executed at a scheduled or given time.

Learn more about program from

https://brainly.com/question/1538272

The UNIX-based operating systems use ________ as a delimiter between parts of a pathname; Windows operating systems use ________

Answers

The UNIX-based operating systems use Linux as a delimiter between parts of a pathname; Windows operating systems use Microsoft.

What is operating system?

An operating system is a piece of software that controls and manages computers such as smartphones, tablets, computers, supercomputers, web servers, automobiles, network towers, smart watches, and other similar devices.

It is the operating system that makes it unnecessary to know a coding language in order to interact with computers.

Thus, Linux and Microsoft are correct options.

For more details about operating system, click here

https://brainly.com/question/11220987

#SPJ1

What is a way to prevent the download of viruses and other malicious code when checking your email?.

Answers

Answer:

It is not permissible to access links or hyperlinked information such as buttons and images in email messages.

Explanation:

Really need help Which of these are ways that hackers gain access to computer systems? Select 3 options.


data validation

data validation


phishing

phishing


packet sniffing

packet sniffing


dumpster diving

dumpster diving


layered security

layered security

Answers

The ways that hackers gain access to computer systems are:

PhishingPacket sniffingDumpster diving

What is system attack?

There are different kinds of system attack. This is where the hacker often attacks the system so as to gather data or information about a system.

The different forms of attacks  includes dumpster diving, shoulder surfing, tailgating, phishing and others. Data validation is not an attack on system.

Learn more about hackers from

https://brainly.com/question/23294592

Answer:

Phishing

Packet sniffing

Dumpster diving

Explanation:

Electronic résumés have an attractive, highly formatted appearance. please select the best answer from the choices provided t f

Answers

Answer:

true

Explanation:

An electronic resume can carry so much data about the person, and it includes images also. Then the statement is true.

What is an electronic resume?

An electronic resume is termed as a resume that is read by a computer program that summarizes the information of each person.

The electronic resume has the data such as their parent name, education, skills, job experience, hobbies, languages, and so on.

Thus, the photo of the document about the project or internship that has been done in the past can be given on the electronic resume by uploading the certificate on the computer system along with the resume.

For example, in companies like Linkedin, and so on there are many companies that ask about the person before creating an account.

More about the electronic resume link is given below.

https://brainly.com/question/2798964

Click this link to view O*NET’s Work Activities section for Petroleum Engineers. Note that common activities are listed toward the top, and less common activities are listed toward the bottom. According to O*NET, what are some common work activities Petroleum Engineers perform? Select four options.


performing for or working directly with the public

interacting with computers

getting information

analyzing data or information

making decisions and solving problems

assisting and caring for others

Answers

Answer: 2 3 4 5

Explanation:i got it wrong so here lol

Answer:

the first one and the last one r wrong the rest all right

Explanation:

what is the greatest number of bits you could borrow from the host portion of a class b subnet mask and still have at least 130 host per supnet

Answers

The greatest number of bits you could borrow from the host portion of a class b subnet mask and still have at least 130 host per subnet is 24.

What is a host bit?

Host bits are known to be the parts of an IP address that can state out a particular host in any subnet.

Note that whenever we take or borrow an host-bit, we can also double the number of subnets that we are said to create and as such, when we borrowing 2 host bits we can have 4 subnets.

Learn more about Bits from

https://brainly.com/question/19667078

How your private data and information are used, who has access to them, which techniques and technologies protect them, and the communications and preferences surrounding how they are handled are components of Internet

Answers

The security components of Internet describes how user's private data are used, who has access to them, which techniques and technologies protect them.

What are the security components of Internet?

The security components of Internet can be defined as a strategic process that highlights and describes how all end user's private data and information are used, who has access to them, which techniques and technologies protect them.

Furthermore, the communications and preferences surrounding how an user's private data and information are handled describes are the security components of Internet.

Read more on security here: https://brainly.com/question/14286078

#SPJ1

Ransomware as a service has allowed the increase of:.

Answers

Ransomware as a Service has allowed the increase of ransomware infections globally.

What is a Ransomware as a Service?

Ransomware as a Service is a type of business association between ransomware operators and affiliates. These affiliates pay to launch ransomware attacks developed by operators.

A ransomware is a type of malicious software that infects the computer of an organization thereby restricting access to their important data unless an amount of money is paid.

Ransomware as a Service has allowed the increase of ransomware infections globally because this business model has allowed malware creators to earn from their ransomware by enlisting a network of distributors.

Therefore, ransomware as a service has allowed the increase of ransomware infections globally.

Learn more about ransomware here:

https://brainly.com/question/23294592

How long does one smoke session stay in your system.

Answers

Answer:

1-2 days

Explanation:

In rare cases 25 days

Other Questions
Which undefined term is used to define a ray? plane circle angle line When two aqueous solutions that differ in solute concentration are placed on either side of a semipermeable membrane and osmosis is allowed to take place, the water will. What can be traded in a commodities market? stock bonds oil debt A 45-foot tall tree is leaning towards a house, making an 86 angle with the ground. To stop the tree from leaning further, a cable is tied from the top of he tree and secured to a point on the ground 30 feet from the tree, opposite from the house. What angle does the cable make with the ground? Why is ice less dense than liquid water? Select two correct responses. In paragraph 2, the word misgivings means doubts false abilityconfidenceworriesfault or error Match the correct words :MeanwhileAcceptedRejectedEarnsElectionTemporarily TroopsRatesResignInfluence Alex for school I need help whoever helps first will get brainlyist What is the volume of the rectangular prism shown below? A. 224 in B. 320 in C. 512 in D. 5,120 in please help my life depends on thissssBased on what you have learned and using the above political cartoon depicting US President and the US actions taking Colonies and becoming an Imperial Power in the Americas (1899) answer the following prompt for extra credit. More complete responses will earn more points (optional).In your own opinion should the US be taking over and controlling other nations and other peoples for our own self-interest? Explain your reasoning. Write in your own words and write 3 complete sentences. Simplify 5^3/5^7 leaving your anwser in index form help!!!!!!!! Find the area of the triangle below. Be sure to include the correct unit in your answer. By age 10, an American child has probably worn down well over 700 crayons!true or false Phone numbers consist of a three-digit area code followed by seven digits. if the area code must have a 0 or1 for the second digit, and neither the area code nor the seven-digit number can start with 0 or 1, how many different phone numbers are possible? how did you come up with your answer? a. 8 times 10 times 10 times 8 times 10 times 10 times 10 times 10 times 10 times 10 = 6,400,000,000 b. 8 times 2 times 10 times 8 times 10 times 10 times 10 times 10 times 10 times 10 = 1,280,000,000 c. 8 times 2 times 10 times 8 times 10 times 10 times 10 times 10 times 10 = 128,000,000 d. 8 times 2 times 10 times 8 times 10 times 10 times 10 times 10 times 10 times 10 times 10 = 12,800,000,000 Santos takes the train into the city five days a week for work. For one work week, he kept track of how many minutes long each train ride was: 48, 51, 48, 48, 50Calculate the mean, median, range, and midrange of the train ride times for the week. The two main tasks of editing areA.finding spelling mistakes and marking punctuation errors.B.finding all kinds of errors and correcting them.C.finding capitalization mistakes and correcting grammar errors.D.finding punctuation mistakes and marking grammar errors. What is the area of triangle BCD to the nearest tenth of a square centimeter? Use special right triangles to help find the height. ( Show your work). Will Only Mark Brainliest if answered correctly and No resharing another students answer from brainly or any other websites or you'll be reported. 3/5x2/5x4/9 in simplest form Consider the numerous pseudoscientific products and ideologies currently being marketed to the public, such as reiki, magnetic therapy, therapeutic touch, and homeopathy. what are the ethical concerns with the sale of these ideas to the public? should proponents of these various products and therapies be held accountable for any health concerns arising from the use of these products? what if the services or products do not cause health concerns or physical harm? Your renter's insurance policy costs $20/month and has a $1,000 deductible. A thief breaks into your apartment and steals your $800 TV set. How much would your insurance company pay?