how are constants and variables different from each other

Answers

Answer 1

Answer:

variables are letters/shapes that are next to a number and constants are numbers without a variable


Related Questions

Betty is photographing a meadow at 1:00 p.m. what camera white balance setting will work best at this time?

Answers

The correct option exists B. Betty is photographing a meadow at 1:00 p.m. Daylight camera white balance setting will work best at this moment. To return the color temperature to neutral, it counts an opposing color to the image. After successfully white balancing an image, whites should occur white rather than blue or orange.

What is Daylight camera?

Daylight – This mode stands for the normal daylight location while shooting outdoors. Many cameras do not include Daylight mode. Cloudy – This mode stands ideal for shooting on a cloudy day. This exists because it warms up the subject and surroundings and permits you to capture better shots.

Which light is better for the eyes yellow or white?

In our living rooms, dining rooms, bedrooms, and other areas of the house, it is recommended to use warm white, which is also understood as yellow color light. The yellow light has a greater calming influence on the eyes since it contains less blue light. It is well known that cool hues may create it challenging to fall asleep.

The Kelvin scale rates the color or warmth of white light; the warmer the color, the more down the color temperature. Candles exist normally around 2000 Kelvin (k), but daylight exists typically between 5500 and 6500k. Digital cameras exist the most adept at choosing the ideal white balance between 3200 and 6500K. In other terms, they're quite good at deciding which color temperature, between a warm interior and daylight white balance, compares to the lighting situations that photographers typically work in.

To learn more about  Daylight camera refer to:

https://brainly.com/question/16146767

#SPJ4

The complete question is,

Betty is photographing a meadow at 1:00 p.m. What camera white balance setting will work best at this time?

A. Flash

B. Daylight

C. Fluorescent

D. Cloudy

Answer:

The answer is Daylight I believe


What is the term that describes when the amount of goods produced is abou
the same as the number of consumers who are willing to buy the product?
A. Risk
B. Equilibrium point
C. Supply
D. Demand

Answers

the answer is equilibrium point (I think so,)

Complete the table???

Answers

Answer:

2.blending mixing, milkshake

3.boiling cooking,tea

what is the full form of BD in computer​

Answers

Answer:

the full form of BD binary digits

Answer:

I hope this answers help you

Explanation:

Bd fullform in computer is Blu-ray disc

JAVA -Develop a program that prompts the user to enter a series of 10 integers and then determines and displays the largest and smallest values entered. The solution must use at least these following variables:

counter -a counter to count how many integers were entered
number -the integer most recently input by the user
smallest -the smallest number entered so far
largest -the largest number entered so far

Write three separate programs in JAVA , the first using a while construct, the second using a for construct, and the third using a do while construct. Thank you so much!

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that enter a series of 10 integers and then determines and displays the largest and smallest values entered.

Writting the code in JAVA:

public class OddEvenSum {  // Save as "OddEvenSum.java"

  public static void main(String[] args) {

    // Declare variables

     final int LOWERBOUND = 1;

     final int UPPERBOUND = 1000;  // Define the bounds

     int sumOdd  = 0;    // For accumulating odd numbers, init to 0

     int sumEven = 0;    // For accumulating even numbers, init to 0

     int absDiff;        // Absolute difference between the two sums

     // Use a while loop to accumulate the sums from LOWERBOUND to UPPERBOUND

     int number = LOWERBOUND;   // loop init

     while (number <= UPPERBOUND) {  // loop test

           // number = LOWERBOUND, LOWERBOUND+1, LOWERBOUND+1, ..., UPPERBOUND

        // A if-then-else decision

        if (number % 2 == 0) {  // Even number

           sumEven += number;   // Same as sumEven = sumEven + number

        } else {                // Odd number

           sumOdd += number;    // Same as sumOdd = sumOdd + number

        }

        ++number;  // loop update for next number

     }

     // Another if-then-else Decision

     if (sumOdd > sumEven) {

        absDiff = sumOdd - sumEven;

     } else {

        absDiff = sumEven - sumOdd;

     }

     // OR using one liner conditional expression

     //absDiff = (sumOdd > sumEven) ? sumOdd - sumEven : sumEven - sumOdd;

     // Print the results

     System.out.println("The sum of odd numbers from " + LOWERBOUND + " to " + UPPERBOUND + " is: " + sumOdd);

     System.out.println("The sum of even numbers from " + LOWERBOUND + " to " + UPPERBOUND + " is: " + sumEven);

     System.out.println("The absolute difference between the two sums is: " + absDiff);

  }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

how to set horizontal text alignment​

Answers

This is a very vague question, but for HTML coding, a horizontal text alignment (or center alignment, which is what I thought you might’ve meant?) would be coded as such:

[Insert text here.]

Apologies if this is not the answer you wanted. This is just a very vague question.

What are the advantages of cloud computing over computing on premises?

Answers

Answer:

answer my question

Explanation:

open my account. i need help.

What is the primary method by which robots (crawlers, spiders) discover new web pages?

Answers

The primary method by which robots (crawlers, spiders) discover new web page is that Robots do follow the path created by websites linking to each other.

What are web page?

A web page (or webpage) is known to be a kind of an hypertext document that is known to be seen or found on the World Wide Web.

Note that the Web pages are said to be often delivered by the use of a  web server to the person who is using the system and it is one that is often shown or displayed in a web browser.

Note that a website is made up of many web pages connected together under what we see as common domain name and as such, The primary method by which robots (crawlers, spiders) discover new web page is that Robots do follow the path created by websites linking to each other.

Learn more about robots from

https://brainly.com/question/13515748

#SPJ1

The readline method of bufferedreader returns _____ when end of file is reached. group of answer choices

Answers

Answer:

null

Explanation:

It does not turn to null value.

it returns;when it reaches the end of file

Chemicals that are responsible for the signs and symptoms of an allergic reaction to a bee sting include: Group of answer choices

Answers

Chemicals that are responsible for the signs and symptoms of an allergic reaction to a bee sting include option b: Histamines and leukotrienes.

What are  Histamines and leukotrienes.

In the workings of allergic rhinitis, histamine is known to be a tool or that which is known to act or functions for the main allergic rhinitis symptoms such as rhinorrhea, nasal itching and others.

Note that Its effect is one that is often seen in nasal congestion but leukotrienes is one that leads to a boast or an increase in that of nasal airway resistance and also in that of vascular permeability.

Hence, based on the given scenario above, the Chemicals that are responsible for the signs and symptoms of an allergic reaction to a bee sting include option b: Histamines and leukotrienes.

See full question below

Chemicals that are responsible for the signs and symptoms of an allergic reaction to a bee sting include:

A) The bee venom itself.

B) Histamines and leukotrienes.

C) Leukocytes and epinephrine.

D) Adrenaline and histamines.

Learn more about allergic reaction from

https://brainly.com/question/2693669

#SPJ1

One of the key advantages the soviet union held over the united states on a global scale was america's continuing issue of:________

Answers

Explanation:

The Americans had a greater nuclear power with more than 300 land based intercontinental ballistic missiles (ICBMs) and a fleet of Polaris submarines. The Soviet Union had only 4 to 6 land based ICBMs and around 100 short range primitive V1 type cruise missiles that could only be launched from surfaced submarines.

____ is a temporary holding area for data, application program instructions, and the operating system.

Answers

The register is a temporary holding area for data application program instructions and the operating system

In what medium do web applications operate?

Answers

Answer

web browser

Explanation:

Web applications primarily operate on the World Wide Web, which is a global network of interconnected computers and servers that use the HTTP (Hypertext Transfer Protocol) protocol for communication.

How to access Web applications

Web applications are accessed by users through web browsers such as Go/ogle Chrome, Moz/illa Firefox, or Micr/osoft Edge.

The core components of a web application typically reside on a web server, which hosts the application's logic, data, and files. When a user interacts with a web application through their browser, the browser sends HTTP requests to the web server, which processes those requests and returns HTML, CSS, JavaScript, and other resources that make up the web application's user interface.

Web applications can also use various backend technologies such as programming languages (e.g., Python, Ruby, Java) and frameworks (e.g., Django, Ruby on Rails, Spring) to handle server-side operations, interact with databases, and provide dynamic functionality.

Learn more about web applications at

https://brainly.com/question/28302966

#SPJ2

explain the joke, “There are 10 types of people in the world: those who understand binary and those who don’t.”

Answers

Answer:

Binary is made up of only 2 digits: a one and a zero. 1011 is eleven in our counting system.

So 10 in binary = 2 in our counting system.

Read the joke as follows. There are 2 types of people in the world: those who  understand binary and those who do not.

I guess it's not really that funny, but computer programmers like it.

Avicenna is smart software being developed by ibm that will be used to assist radiologists with interpreting medical images such as?

Answers

Avicenna is smart software being developed by ibm that will be used to assist radiologists with interpreting medical images such as CT Scans.

What can be detected by CT scan?

The ailment or disease that a CT scan can find are :

Some types of cancer and  tumors.Fractures such as (broken bones).Heart disease.

Note that a computerized tomography (CT) scan is known to be one that makes use of both a series of X-ray images that are known to be obtained from a lot of angles around a person's body and  ti is known to also uses computer processing to make cross-sectional images (slices) of the bones, blood vessels and others.

Therefore,  CT scan images gives a kind of a more-detailed information than just X-rays  and as such, Avicenna is smart software being developed by ibm that will be used to assist radiologists with interpreting medical images such as CT Scans.

Learn more about software from

https://brainly.com/question/1538272

#SPJ1

What are the different elements of a window?​

Answers

Answer: title bar, menu bar, the workspace

Explanation:

Enabling a device login password or PIN, and an inactivity timeout to force (re)login with that password or PIN after the device is idle for a defined period, is generally considered:

Answers

Enabling a device login password or PIN, and an inactivity timeout to force (re)login with that password or PIN after the device is idle for a defined period, is generally considered To be very  Essential for any computer.

What is  password Essential for any computer?

The use of the  Passwords is known to be a tool that can help to give or provide the first kind of defense that a person can often use against unauthorized access to one's computer and personal information.

Note that the stronger a password is, the more protected one can say that your system or computer will be from any kind of hackers and malicious software.

Therefore, Enabling a device login password or PIN, and an inactivity timeout to force (re)login with that password or PIN after the device is idle for a defined period, is generally considered To be very  Essential for any computer.

See full question below

Enabling a device login password or PIN, and an inactivity timeout to force (re)login with that password or PIN after the device is idle for a defined period, is generally considered: Essential for any computer. Necessary to consider, because physical security is always something that must be evaluated.

Learn more about password from

https://brainly.com/question/17174600

#SPJ1

What level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications?

Answers

The view/print privileges is the level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications.

What is a Subapplicant?

Subapplicant is known to be a term that connote a State agency, or a community, that is said to be submitting a subapplication to the applicant and this is one that is often used as a source of aid under the FMA program.

Note that Upon grant award, the subapplicant is seen as the subrecipient and thus, The view/print privileges is the level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications.

Learn more about subapplication from

https://brainly.com/question/14400492

#SPJ1

Which is a type of artificial neural network (ann) that includes many layers to deal with complex problems that may have very large data sets?

Answers

Answer:

Deep Learning

Explanation:

The kind of artificial neural network (ann) that includes many layers to deal with complex problems that may have very large data sets is called a Deep neural network.

What is an artificial neural network?

Artificial neural networks, more commonly referred to as neural networks or neural nets, are computer architectures that draw inspiration from the biological neural networks seen in animal brains.

Artificial neurons, which are a set of interconnected units or nodes that loosely resemble the neurons in a biological brain, are the foundation of an ANN.

Deep Learning is a type of artificial neural network (ann) that has several layers to handle complicated issues that may have very big data sets. Deep neural networks use advanced math modeling to interpret input in complicated ways.

Learn more about artificial neural networks here:

https://brainly.com/question/19537503

#SPJ2

In _________, the process requests permission to access and modify variables shared with others. a) entry section b) critical section c) exit section

Answers

In critical section, the process requests permission to access and modify variables shared with other

Which of the following is a group of computer systems and computing hardware devices linked together through various communication channels?

Digital network
Data linking
File sharing
Intranet

Answers

Digital network, as it refers to the series of connected and linked computing devices into a network as described in this question.

5 The following text is stored as a text file:
She sells sea shells on the seashore. The shells that she sells are sea shells I am sure. Explain how lossless compression would compress this file.

Answers

Lossless compression decreases file size without removing any bits of information. Instead, this format works by removing sameness within data to reduce the overall file size. With lossless, it is possible to perfectly rebuild the original file.

What utilizes lossless compression?

Lossless compression is commonly used for so-called "discrete" data, such as database records, spreadsheets, word-processing files, and even some types of image and video information. Text compression is a powerful area for lossless compression.

What is lossless compression example?

Lossless compression methods are reversible. Examples of lossless reduction include GZIP, Brotli, WebP, and PNG, Lossy compression, on the other hand, uses inexact approximations by dumping some data from the original file, making it an irreversible compression process

To learn more about Lossless compression, refer

https://brainly.com/question/17266589

#SPJ9

A threat vector is an item of code on a distributed device that reports the condition of the device to a central server.
a. true
b. false

Answers

Answer:

A threat vector is an item of code on a distributed device that reports the condition of the device to a central server.

a. true

It is true that a threat vector is an item of code on a distributed device that reports the condition of the device to a central server. The correct option is a.

What is a threat vector?

The total number of attack vectors that an attacker can use to manipulate a network or computer system or extract data is referred to as the attack surface.

Threat vector and attack vector are interchangeable terms that describe the various ways a hacker can gain access to data or other confidential information.

The methods used by adversaries to breach or infiltrate your network are referred to as attack vectors.

Malware and ransomware, as well as man-in-the-middle attacks, compromised credentials, and phishing, are all examples of attack vectors.

A threat vector is a piece of code on a distributed device that reports the device's status to a central server.

Thus, the correct option is a.

For more details regarding a threat vector, visit:

https://brainly.com/question/28558110

#SPJ2

Kourtney is searching for a software package that provides many resources for software developers all in one place. What should Kourtney search for?

Answers

The thing or factor that Kourtney need to search for is said to be an integrated development environment.

What is software package?

This is known to be a composition or a set of related programs that is said to be made for a specific type of task such as word processing, sold and it is one that a user can be able to use as a single unit.

Since Kourtney is searching for a software package that provides many resources for software developers all in one place, an integrated development environment is the best option for her.

Learn more about software package from

https://brainly.com/question/1538272

#SPJ1

To open a folder on the desktop using a mouse, you should place the pointer of the mouse over the target object and do what action?.

Answers

To open a folder on the desktop using a mouse, you should place the pointer of the mouse over the target object and  double click , in rapid succession, using the left mouse button.

Which mouse pointer will open the file folder?

When a person is known to be using Windows 10 or an older version of any given Windows, a person can be able to open files and folders through the act of double-clicking on them.

Note that based on the above, if a person can alter this behavior to open files using a single click ( that is the mouse is used by double-clicking on a single click).

Therefore, based on the above, To open a folder on the desktop using a mouse, you should place the pointer of the mouse over the target object and  double click , in rapid succession, using the left mouse button.

Learn more about mouse from

https://brainly.com/question/10847782

#SPJ1

enumerate five features of Microsoft excel 2016​

Answers

Answer:

Smarter Autocorrect, Improved Functions of Excel Workbook, New Funnel charts, and Smarter insertion of pictures.

Explanation:

For 8 features of Microsoft excel 2016, check out this website:

https://www.educba.com/features-of-2016-excel-workbook/

Hope this helps!

You are planning to depart on a flight from area 2 to area 4 in 12 hours. What weather is forecast to occur along your route?

Answers

It depends on where you live!

the three basic steps of a CPU are fetch, decode, and execute. Some experts describe this cycle as simply “fetch-execute.” Do you think the three-step description or the two-step description provides a better explanation of how a CPU works? Why?.

Answers

I believe the statement of the three -step description and it is known to be the basic operation of a computer as the CPU is made to understand these set of instructions.

What is the cycle about?

The basic operation of any system is known to be the ‘fetch-execute’ cycle.  It is said to be one that fetches the instructions usually from the central memory and then it is said to executes them.

Note that

The CPU fetches the instructions.The CPU also decodes the instruction.The CPU also executes the instruction.

Hence, I believe the statement of the three -step description and it is known to be the basic operation of a computer as the CPU is made to understand these set of instructions.

Learn more about fetch-execute cycle  from

https://brainly.com/question/9964445

#SPJ1

which technologies are currently used in health ​

Answers

1. Portable Monitors. ...
2. Smart Beds. ...
3. Wearable Devices. ...
4. Electronic Health Records. ...
5. Centralized Command Centers. ...
6. Telehealth and Apps.

Which example best describes an unethical use of computers? A. Sidney uses a computer to create a website that allows them to share personal writing and art. B. Jill leaves her computer on during lunch. Her supervisor opens and reads an email addressed to her. C. Trang uses a computer to collaborate with friends on a group project for school. O D. Sanjay uses a computer to order groceries online and have them delivered to his home.​

Answers

Answer is B

Explanation: Common Sense

Answer:

B

Explanation:

Other Questions
Can local law enforcement officers enforce the laws pertaining to alcoholic beverages?. Which civilization did not grow up in Mesopotamia? A Babylonia B Assyria C Kush D Sumer The change in a firm's total cost from producing one more unit of a good or service is:______ Bill clinton's presidency marked the beginning of what in american political life? What is the molarity of a solution if there are 160.0 g of h2so4 in a 0.500 l solution? Business incubators provide assistance to established companies attempting to generate foreign sales. a) true b) false When a database stores view data, it uses a _____ that depends on data in a corresponding _____. Lou received requests for 150 tickets for their art show. The number of requests was 120% of the number of tickets they had. How many tickets do they have? When filing your tax return, what is the maximum amount you can deduct for a capital loss?. A constant net force F acts on a body during a time interval t. If u and v are the initial and final velocity of the body respectively, the impulse Ft of this force is given by the equation Ft = mv-mu. Which of the following are polynomials?A. x^2 + x + 1/x^2 + 1B. 2/x^3 + x + 1/2C. 2/3x^2 + x + 1D. x^2/3 + 0x + 1E. x^3 + 2x + square root of 2 Can u guys please give me the correct answe What is the avergae percent increase in the count rate over the voltage range of the geiger tube plateau? Kyle invested $15,000 in a savings account. if the annual interest rate is 5%, how much will be in the account in 10 years for quarterly compounding? round your answer to two decimal places. The cns (central nervous system) is lacking in animals that have ________.a. a complete gut b. a closed circulatory system c. radial symmetry d. excitable membranes URGENTA 10 M concentrated stock solution of NaCl is used to prepare 3 liters of diluted 1 M solution. Which of the following is true for the process used to achieve the required dilution? The volume of stock solution used is less than 0.2 liters. The volume of stock solution used is less than 3 liters. The volume of the solvent used is less than 0.2 liters. The volume of the solvent used is more than 3 liters. What are the factors that cause land and water to heat and cool differently? choose all that apply. Drew read an article about the dash eating plan. She learned that dash eating pattern is high in _____ but low in _____ A regular hexagon has an apothem of 14.7 inches and a perimeter of 101.8 inches. what is the area of the hexagon? square inches PLEASE I NEED THIS FAST there are 3 denominations of bills in a wallet: $1, $5, and $10. there are 5 fewer $5-bills than $1-bills there are half as many $10-bills if there is $115 altogether, find the number of each type of bill in the wallet