answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexdok [17]
2 years ago
11

Accepted identifier for a variable in PHP except:

Computers and Technology
1 answer:
Svetradugi [14.3K]2 years ago
7 0

Answer:

b. & Puihaha

Explanation:

PHP variables are supposed to start with a $ sign.

Other rules followed by PHP variables are:

Starting character in variable name (after $) must be letter or _.

Other characters in variable names can be letters,numbers or _.

a. $_Puihaha

c. $Pui_haha

d. $Puihaha

satisfy these rules.

Whereas , b. & Puihaha does not satisfy as it starts with '&'. Moreover it also contains an invalid space character in the variable.

You might be interested in
Assume that myCar is an instance of the Car class and that the Car class has a member function named accelerate. Which of the fo
Ymorist [56]

Answer:

C

Explanation:

myCar::accelerate()

here :: operator is used to access the member function outside the class.

we are calling accelerate() function using class and ::

5 0
2 years ago
Iris called the company’s security hotline. The hotline is an anonymous way to report suspi- cious activity or abuse of company
marishachu [46]

Answer 1 :

if Iris had approached Henry, it might had become a personal matter rather than professional. Following the proper protocol is the best way to report in any organization.

Answer 2 :

Yes, Gladys should call the legal authorities. Federal Trade Commission (FTC) is the best agency to file a complaint prevention of corruption within a company.

Answer 3 :

Yes, she should have followed her chain of command because that is one of the many questions that an investigator will ask is if she reported it to her supervisor and human resources. Somehow in companies they use that term when it is somewhat of a legal issue. Internally if she knew the IT director and the security office she could have gone to them along with human resources. Outside I would say start with her local police department and they may have directed her to the proper channel.

Answer 4 :

What Henry did was not ethical even in the slightest. He used the flash drive without permission from the company, he knew he shouldn’t have, but he did it anyway. It is acted in a complete ethical way. If Iris had left this in a coffee station and forgot about it, then it would have been unethical behavior because she knew about it but didn’t whistle blow. There are security laws that get violated in this issue which is why it is unethical and troublesome.

5 0
2 years ago
Convert the following binary number to octal (111000)2​
yKpoI14uk [10]

Answer: (111000)2 = (70)8

Step by step solution:

Step 1: Write down the binary number

   (111000)2

  Group all the digits in sets of three starting from the LSB (far right). Add zeros to the left of the last digit if there aren't enough digits to make a set of three.

   111 000

Step 2: Use the table below to convert each set of three into an octal digit. In this case,

 111=7, 000=0.

So, the number 111000 in binary is equivalent to 70 in octal.

To convert from binary to octal use the following table:

Bin:     000 001    010     011    100 101     110     111

Octal:     0         1        2         3       4       5       6       7

7 0
2 years ago
Given a sorted array of integer, A, with possible duplicate elements. Implement an efficient (sublinear running time complexity)
allsm [11]

Answer:

The java program is as follows.

import java.util.*;

import java.lang.*;

public class SearchProgram

{

   // sorted array may or may not containing duplicate elements

   static int A[] = {-1, 2, 3, 5, 6, 6, 6, 9, 10};

   

   // variable to keep track of number of occurrences, declared and initialized to 0

   static int times=0;

   

// variable to hold value to be searched in the array

   static int key;

   static int search(int[] art, int n)

   {

       // enhanced for loop used to find how many times n occurs in array, arr

       for(int j:arr)

       {

           if(n == j)

               times = times+1;

       }

       

       return times;

   }

   

   public static void main(String[] args)

   {

       // scanner object to allow user input

       Scanner sc = new Scanner(System.in);

       

       // user prompted to enter key to be searched

       System.out.print("Enter the element to be searched: ");

       key = sc.nextInt();

       

       // message displayed to the user on how many times the element is present in the array

       System.out.println("The element " + key + " is present " + search(A, key) + " times in the array.");

   

   }

}

OUTPUT

Enter the element to be searched: 3

The element 3 is present 1 times in the array.

Explanation:

The steps of program execution are shown below.

1. An integer array, A, is declared and initialized.

2. An integer variable, times, is declared and initialized to 0.

3. A method, search(), is created which takes 2 parameters, array A and user entered value for the element to be searched in A.

4. The search() method has return type of integer and returns the value of variable, times.

5. Inside the search() method, an enhanced for loop is used to compute the value of the variable, times.

6. In the main() method, user is prompted to enter the value of key.

7. The search() is called and value of the variable, times, displayed to the user.

8. All the methods and variables are declared as static.

7 0
2 years ago
De'Von is graduating from college and wants to create a professional development plan in order to prepare for his future. What i
galina1969 [7]

1. De'von must first ask himself What is the job I want?

2. A person preparing for his future career must first become aware of what does he actually wants in his life?

3. What kind of job he is well suited for?

4. Where his interest lies?

5. Then he will have to discover what kind of skills he is having in which areas he needs to improve?

6. What are the set of skills he requires for his dream job?

6 0
2 years ago
Other questions:
  • A chemical found in the synaptic vesicles , which , when released . has an effect on the next cell is called a?
    10·1 answer
  • Which of the following best describes open-source web browsers?
    11·2 answers
  • Terry came into work and turned on his computer. During the boot process, the computer shut down. When he tried again, the compu
    14·1 answer
  • Will mark brainliest if correct. First come, first serve.
    15·1 answer
  • Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to
    13·1 answer
  • System design is the determination of the overall system architecture-consisting of a set of physical processing components, ___
    6·2 answers
  • Write a multithreaded program that generates the Fibonacci series using Pthreads thread library. This program should work as fol
    10·1 answer
  • Write a function that takes a string like 'one five two' and returns the corresponding integer (in this case, 152). A function j
    11·2 answers
  • Select the correct answer. Andy wants to become a multimedia producer. Which degree can help him achieve this goal? A. bachelor’
    5·1 answer
  • 1)When the liquid is spun rapidly, the denser particles are forced to the bottom and the lighter particles stay at the top. This
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!