In SQL, a delete statement is used to delete data from a table. However, if a reference constraint exists between two tables, then deleting data from one table may violate that constraint.
This can result in the "delete statement conflicted with the reference constraint" error message.Reference constraints are rules that ensure that data in one table is linked to data in another table. For example, a customer order table may have a foreign key that references a customer table. This means that an order can only be associated with a customer that exists in the customer table.
If a customer is deleted from the customer table, then any orders associated with that customer will violate the reference constraint.Alternatively, you may need to modify the reference constraint to allow for cascading deletes. This means that if a parent record is deleted, then all associated child records will also be deleted automatically. However, this approach should be used with caution, as it can lead to unintended data loss if not implemented properly.
To know more about data visit:
https://brainly.com/question/30051017
#SPJ11
at netflix, the majority of the dvd titles shipped are from back-catalog titles, not new releases.
T/F
Answer:
It is truth
Explanation:
ITS TRUTH
Q4 - The folder Stock_Data contains stock price information (open, hi, low, close, adj close, volume) on all of the stocks listed in stock_tickers.csv. For each of the stocks listed in this file, we would like to compute the average open price for the first quarter and write these results to new csv called Q1_Results.csv.
a)First read the 20 stock tickers into a list from the file stock_tickers.csv
b) Next, create a dictionary where there is a key for each stock and the values are a list of the opening prices for the first quarter
c)The final step is writing the result to a new csv called Q1_results.csv
The Python code reads stock tickers from a file, calculates the average opening prices for the first quarter of each stock, and writes the results to "Q1_Results.csv".
Here's an example Python code that accomplishes the tasks mentioned:
```python
import csv
# Step a) Read stock tickers from stock_tickers.csv
tickers = []
with open('stock_tickers.csv', 'r') as ticker_file:
reader = csv.reader(ticker_file)
tickers = [row[0] for row in reader]
# Step b) Create a dictionary with opening prices for the first quarter
data = {}
for ticker in tickers:
filename = f'Stock_Data/{ticker}.csv'
with open(filename, 'r') as stock_file:
reader = csv.reader(stock_file)
prices = [float(row[1]) for row in reader if row[0].startswith('2022-01')]
data[ticker] = prices
# Step c) Write the results to Q1_Results.csv
with open('Q1_Results.csv', 'w', newline='') as results_file:
writer = csv.writer(results_file)
writer.writerow(['Stock', 'Average Open Price'])
for ticker, prices in data.items():
average_open_price = sum(prices) / len(prices)
writer.writerow([ticker, average_open_price])
```
In this code, it assumes that the stock tickers are listed in a file named "stock_tickers.csv" and that the stock data files are stored in a folder named "Stock_Data" with each file named as the respective stock ticker (e.g., "AAPL.csv", "GOOGL.csv").
The code reads the stock tickers into a list, creates a dictionary where each key represents a stock ticker, and the corresponding value is a list of opening prices for the first quarter. Finally, it writes the results to a new CSV file named "Q1_Results.csv", including the stock ticker and the average open price for the first quarter.
Please note that you may need to adjust the code based on the specific format of your stock data CSV files and their location.
To learn more about tickers, Visit:
https://brainly.com/question/13785270
#SPJ11
what is profession explain with example
Answer: a profession is a job, or what you do for a living
example : a teacher is an example of proffesion
Answer:
the activities which are done for earning and to live life is called profession . eg: doctor ,engineer,
A town government is designing a new bus system. The planners are deciding where to put the different bus stops. They want to pick a set of bus stop locations that will minimize the distance anyone needs to walk in order to get to any bus stop in town. What term best defines this kind of problem?
A. A decision problem
B. An optimization problem
C. An undecidable problem
D. An efficiency problem
01000100 01101001 01100100 00100000 01111001 01101111 01110101 00100000 01101011 01101110 01101111 01110111 00100000 01110100 01101000 01100001 01110100 00100000 01110011 01101000 01110010 01101001 01101101 01110000 00100111 01110011 00100000 01101000 01100101 01100001 01110010 01110100 00100000 01101001 01110011 00100000 01100001 01110100 00100000 01110100 01101000 01100101 01101001 01110010 00100000 01100010 01110010 01100001 01101001 01101110 00111111
Convert this to text
Answer:
This binary problem will convert to the text:
Did you know that shrimp's heart is at their brain?
Explanation:
Joe is a florist and wants to increase his client base. How can he achieve this with the help of a computer?
A.
advertise his products
B.
email his friends
C.
calculate his sales for the year
D.
analyze marketing trends
Answer:
its A I just took the test
Explanation:
How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas
The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.
How did Native Americans gain from the long cattle drives?When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.
Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.
There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.
Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.
Learn more about cattle drives from
https://brainly.com/question/16118067
#SPJ1
1.What do diamonds, NFL players, and antique corvettes have in common?
2. What are two hidden costs of employment?
3. What were the Chocolate Wars about?
The thing that diamonds, NFL players, and antique corvettes have in common is that the NFL players loves buying them and showing off with them because it is a great assets that they can still sell at higher price in the future.
The two hidden costs of employment are:
Uncompensated Training. Relocation CostsWhat were the Chocolate Wars about?The Chocolate War, which Robert Cormier initially published in 1974, is still a go-to novel for book banners and censors. The Vigils, a secret club whose members coerce and threaten most pupils into adhering to their rules, are the subject of the book.
Jerry's refusal to participate in the school's chocolate sale has caused a lot of conflict. rising action Jerry's rejection after the first ten days and the penalty that followed for that decision from The Vigils.
Therefore, one can say that opportunity costs are hidden expenses that result from using resources that the company owns but may be put to better use. These expenses frequently go unnoticed and are hidden from view.
Learn more about employment from
https://brainly.com/question/1446509
#SPJ1
1
TIME REMAINING
01:51:06
Zubair needs to change some of the data in a table that he has created. How should he go about selecting a row in
the table?
Moun the mourn nointor in a noint hefore the text in a cell
Describe an example of organisms with different niches in an ecosystem.
Explanation:
Organism seems to have its own bearable environments for many ecological parameters and blends into an ecological system in its own unique way. A aquatic species' niche, for particular, can be characterized in particular by the salt content or saltiness, pH, and surrounding temperature it can absorb, and also the kinds of food it can consume.
in the above environment and store, if we execute lettuce expression deref(y)(deref(z)) do changes occur in the memory store?
Based on the information provided, it seems that you are referring to some specific environment and store, possibly related to a programming language or framework.
However, without additional context or details about the environment and store, I cannot provide a specific answer.In general, the behavior of executing the expression deref(y)(deref(z)) depends on the semantics of the language or framework you are using, as well as the values and references stored in memory. The expression may perform operations such as dereferencing pointers or accessing values stored in variables or objects.If the expression modifies the values or references stored in memory, then changes can occur in the memory store. However, without more information about the specific environment and store, it is not possible to determine the exact impact of executing that expression.
learn more about framework here:
https://brainly.com/question/25333958
#SPJ11
identify one key takeaway you have from looking at the latest identity theft trends.
As an AI language model, I don't have access to the latest identity theft trends.
However, in general, one key takeaway from identity theft trends is that it is an ongoing and evolving threat that affects individuals and organizations of all sizes and in all industries. It is essential to take proactive steps to protect personal and sensitive information, such as using strong and unique passwords, enabling two-factor authentication, monitoring financial statements and credit reports regularly, and being cautious about sharing personal information online or with unfamiliar individuals or organizations. It is also important to stay up-to-date on the latest trends and best practices for preventing identity theft and responding to it if it does occur.
To learn more about AI language
https://brainly.com/question/25523571
#SPJ11
Python String Functions: Create a new Python Program called StringPractice. Prompt the user to input their name, then complete the following:
Length
• Print: “The length of your name is: [insert length here]”
Equals
• Test to see if the user typed in your name. If so, print an appropriate message
Really appreciate the help.
#Swap this value by your name. Mine is Hamza :)
my_name = "Hamza"
#Get input from user.
inp = input("What's your name?: ")
#Print the length of his/her name.
print("The length of your name is",len(inp),"characters.")
#Check if the input matches with my name?
#Using lower() method due to the case insensitive. Much important!!
if(inp.lower()==my_name.lower()):
print("My name is",my_name,"too! Nice to meet you then.")
methods that retrieve data of fields are called and methods used to modify the data in fields are called
Field data retrieval methods are referred to as Accessors, and field data modification methods are referred to as Mutators.
A mutators method is a technique used in computer science to manage changes to a variable. As setter techniques, they are likewise well-known. A getter, which returns the value of the private member variable, frequently follows a setter and together they are referred to as accessors.
According to the encapsulation concept, the mutator method is most frequently employed in object-oriented programming. In accordance with this principle, member variables of a class are made private to hide and protect them from other code. A public member function (the mutator method) is the only way to change a private member variable; it receives the desired new value as a parameter, validates it, and then modifies the private member variable. Assignment operator overloading and mutator methods are similar.
Learn more about mutators here:
https://brainly.com/question/15725263
#SPJ4
Need help completing the following program using Raptor. Any help is appreciated. Task: Create a modularized Rock, Paper, and Scissors game that lets user play 7 Rock, Paper, and Scissors game against computer. The program should display each game's result and the final result for the 7 games. The program should contain the following procedures: getComputerChoice receives nothing but returns a word randomly picked from Rock, Paper, and Scissors. getUserChoice receives nothing but returns a word user picked from Rock, Paper, and Scissors. play receives computerPicked and userPicked and returns winner's name, computer or user. main: call the above procedures 7 times, display each game's result, and final result summary. Note: Game rule: Paper wins Rock, Rock wins Scissors, and Scissors wins Paper. Here is a sample output: Computer User Winner Game 1 Paper Rock Computer Game 2 Paper Scissors User Game 3 Rock Rock Tie Game 4 Scissors Rock User Game 5 Rock Scissors Computer Game 6 Scissors Rock User Game 7 Paper Paper Tie ---------------------------------------------------- Total Games Played: 7 User Won: 3 times Computer Won: 2 times Tied: 2 times Raptor X File Edit Scale View Run Mode Ink Window Generate Help 80 Symbols main Assignment ETS Call End Input Output Selection Loop
The program based on the question requirements is given below:
The Programimport random
def getComputerChoice():
return random.choice(["Rock", "Paper", "Scissors"])
def getUserChoice():
valid_choices = ["Rock", "Paper", "Scissors"]
while True:
user_choice = input("Choose Rock, Paper, or Scissors: ").capitalize()
if user_choice in valid_choices:
return user_choice
else:
print("Invalid choice. Please choose again.")
def play(computerPicked, userPicked):
if computerPicked == userPicked:
return "Tie"
else:
return "User"
def main():
computer_wins = 0
user_wins = 0
for i in range(7):
computer_choice = getComputerChoice()
user_choice = getUserChoice()
winner = play(computer_choice, user_choice)
print(f"Game {i+1}: Computer chose {computer_choice}, User chose {user_choice}. Winner: {winner}")
if winner == "Computer":
computer_wins += 1
elif winner == "User":
user_wins += 1
main()
Read more about programs here:
https://brainly.com/question/23275071
#SPJ1
A word processing program would probably be used to
Answer:
Create a contract to hire someone
Explanation:
(APEX)
Answer:
the answer is Create a contract to hire someone
Explanation:
16. Which substance below is not like the others in regards to resistance?
A. plastic
B. rubber
C. glass
D. copper
Answer:
D. copper
Explanation:
Copper is not like the other substances in regards to resistance. Plastic, rubber, and glass are all insulators, meaning they have high resistance to the flow of electric current. Copper, on the other hand, is a conductor, meaning it has low resistance to the flow of electric current.
where can you view detailed information about threats that have been detected on protected endpoints?
The Threats tab is a place where you can view detailed information about threats that have been detected on protected endpoints.
What is a threat tab?
The Threats tab on the Endpoint information screen allows you to view all security threats detected on a specific endpoint.
Threat detection refers to an IT organization's capacity to recognize threats to a network, its applications, or other assets with speed and accuracy. Understanding the hazards that exist in the cyber world is the first step in developing an efficient threat detection and response strategy.
Therefore, You can read comprehensive details regarding threats that have been found on protected endpoints under the Threats page.
To learn more about threat, refer to the link:
https://brainly.com/question/29941324
#SPJ1
Briefly summarize the policy issue of how cotton subsidies in the U.S. have historically influenced cotton production in developing countries, particularly the "Cotton 4" countries. In your response, address how these subsidies have influenced exports by "Cotton 4" countries based on the trade distortions we have learned about in class and based on your reading of the case study.
2. Briefly explain the 2014 WTO Dispute Settlement of the Cotton case between the United States and Brazil, and the changes that resulted from it.
Cotton subsidies in the U.S. have historically influenced cotton production in developing countries, particularly the "Cotton 4" countries. These subsidies have created trade distortions that impact the exports of the "Cotton 4" countries.
The policy issue of cotton subsidies in the U.S. has had a significant impact on cotton production in developing countries, specifically the "Cotton 4" countries (Benin, Burkina Faso, Chad, and Mali). The subsidies provided to U.S. cotton farmers have resulted in overproduction and lower global prices for cotton. This has made it difficult for cotton farmers in the "Cotton 4" countries to compete in the global market.
The subsidies in the U.S. create trade distortions by artificially lowering the price of cotton. This leads to an increase in U.S. cotton exports, as their cotton becomes more competitive due to the lower prices. However, the lower global cotton prices negatively affect the "Cotton 4" countries, as their cotton exports become less competitive in the global market.
In 2014, a dispute settlement was reached at the World Trade Organization (WTO) between the United States and Brazil regarding the cotton case. The United States was found to be providing trade-distorting subsidies to its cotton farmers, which violated WTO rules. As a result, the United States agreed to make changes to its cotton subsidy program.
The changes resulting from the WTO dispute settlement included reducing direct payments to cotton farmers, implementing a new insurance program, and increasing funding for market development activities. These changes aimed to reduce the trade distortions caused by the subsidies and create a more level playing field for cotton producers worldwide.
Overall, the policy issue of cotton subsidies in the U.S. has had a significant impact on cotton production in developing countries, particularly the "Cotton 4" countries. The WTO dispute settlement in 2014 brought about changes to the U.S. cotton subsidy program, aiming to address the trade distortions caused by these subsidies.
To know more about policy refer to:
https://brainly.com/question/26055567
#SPJ11
Which two protocols manage neighbor discovery processes on IPv4 networks? a. ICMP and ARP b. IPv4 and IPv6 c. TCP and UDP d. BGP and OSPF.
The two protocols that manage neighbor discovery processes on IPv4 networks are ICMP and ARP.
Explanation:
ICMP (Internet Control Message Protocol) and ARP (Address Resolution Protocol) are two protocols used to manage neighbor discovery processes on IPv4 networks.
ICMP is used to diagnose network problems and send error messages. It is also used to discover the IP address of a device on the network.
ARP is used to map an IP address to a MAC address. When a device wants to send a packet to another device on the network, it needs to know the MAC address of the device. ARP resolves the MAC address of a device based on its IP address.
Together, ICMP and ARP manage the neighbor discovery processes on IPv4 networks. ICMP helps devices discover each other's IP addresses, while ARP helps devices map those IP addresses to MAC addresses.
To get similar answer on ICMP (Internet Control Message Protocol):
https://brainly.com/question/27961582
#SPJ11
Explain why Windows reports 8 GB of memory even though the one SO-DIMM contains 4 GB of memory.
Can the laptop receive a memory upgrade and if so, how much will it cost?
Due to the laptop's dual-channel memory arrangement, which allows it to use two SO-DIMMs simultaneously, Windows reports 8 GB of memory.
Each SO-DIMM in this instance is delivering 4 GB of memory, making a total of 8 GB available. The OS and the game are considerably more knowledgeable about how the RAM should be maintained and what assets should be moved where than you or I am.
High RAM use is in no way harmful. You don't pay for 8GB to utilize only 2GB, do you? In that case, purchase 2GB instead. Never worry about RAM utilization unless an unknown app is using too much and preventing the use of other system features or capabilities.
Learn more about memory here-
https://brainly.com/question/30273393
#SPJ4
how could technology help our physical bodies
Answer: it can help our boodies by getting people more muscular and,like a treadmill.
Explanation:
Will give brainliest if answered right
Answer:
control shift u
Explanation:
Answer:
I believe U is the answer.
please convert this for loop into while loop
Answer:
The code segment was written in Python Programming Language;
The while loop equivalent is as follows:
i = 1
j = 1
while i < 6:
while j < i + 1:
print('*',end='')
j = j + 1
i = i + 1
print()
Explanation:
(See attachment for proper format of the program)
In the given lines of code to while loop, the iterating variables i and j were initialised to i;
So, the equivalent program segment (in while loop) must also start by initialising both variables to 1;
i = 1
j = 1
The range of the outer iteration is, i = 1 to 6
The equivalent of this (using while loop) is
while ( i < 6)
Not to forget that variable i has been initialized to 1.
The range of the inner iteration is, j = 1 to i + 1;
The equivalent of this (using while loop) is
while ( j < i + 1)
Also, not to forget that variable j has been initialized to 1.
The two iteration is then followed by a print statement; print('*',end='')
After the print statement has been executed, the inner loop must be close (thus was done by the statement on line 6, j = j + 1)
As seen in the for loop statements, the outer loop was closed immediately after the inner loop;
The same is done in the while loop statement (on line 7)
The closure of the inner loop is followed by another print statement on line 7 (i = i + 1)
Both loops were followed by a print statement on line 8.
The output of both program is
*
*
*
*
*
speed(?)
penup?
? (-200, -200)
? (90)
Pendown?
begin_fill?
? ("tan")
#Trace the outside of the grid (shape is a square)
? (400)
right(?)
? (400)
right(?)
? (400)
right(?)
? (400)
right(?)
end_fill?
? Go to lower, left corner of R and have turtle look up. Pen and shape fill blue
?()
set position(?)
?()
? ("blue")
begin_fill?
? Trace the outside of the letter R.
forward(?)
? (90)
? (160)
right(?)
forward(?)
? (90)
? (20)
? (100)
? (120)
right(?)
? (40)
right(?)
? (120)
? (80)
forward(?)
left(?)
? (120)
? (90)
? (40)
right(?)
end fill ()
? Move to inside of R (lower left corner). Color tan and fill the shape.
penup?
? (-40,20)
?()
color ("?")
begin_fill?
? Trace the inside of R (shape is a square).
forward(?)
? (90)
? (80)
right(?)
forward(?)
? (90)
? (80)
right(?)
end_fill?
? Go to lower, left corner of R. Make pen white and pensize 8.
?()
? (-80, -140)
? ("white")
pensize(?)
?()
? Trace outside of the letter R.
forward(?)
? (90)
? (160)
right(?)
forward(?)
? (90)
? (20)
? (100)
? (120)
right(?)
? (40)
right(?)
? (120)
? (80)
forward(?)
left(?)
? (120)
? (90)
? (40)
right(?)
? Move to inside of R (lower left corner).
penup?
? (-40,20)
?()
? Trace the inside of R (shape is a square).
forward(?)
? (90)
? (80)
right(?)
forward(?)
? (90)
? (80)
right(?)
Answer:
used HP UC visit relationship Nurs.Makrapar.
when flynn added a date field to a pivottable, excel grouped the date values into quarters, months, and years. what can flynn do if he does not want to group the pivottable this way?
If Flynn does not want to group the Pivot Table, then he can
Regroup the dates to show quarters only.Ungroup the dates.What is a Pivot Table?
The individual items in a larger table are aggregated into one or more discrete categories in a pivot table, which is a table of grouped data. This summary may comprise sums, averages, or other statistics, which the pivot table aggregates using a selected aggregation function applied to the aggregated information. If you need to track sums of long rows or columns of information that you can quickly compare to one another, pivot tables can be quite helpful.
Large volumes of data can be easily summarized interactively using pivot tables. A pivot table can be used to answer unexpected inquiries about your data and conduct an in-depth analysis of numerical data. A pivot table is particularly useful for Querying massive volumes of data in a variety of user-friendly ways.
To learn more about a pivot table, use the link given
https://brainly.com/question/29526863
#SPJ4
SQL is considered difficult to learn; its command set has a vocabulary of more than 300 words.
a. True
b. False
Answer:
Explanation:
a. True
SQL (Structured Query Language) is a programming language used to manage data in relational databases. While it is relatively easy to learn the basic concepts of SQL, it can become more challenging as you learn the more advanced concepts and try to write more complex queries.
The command set for SQL does have a relatively large vocabulary, with over 300 words and commands that can be used to perform various tasks such as creating and modifying tables, inserting, updating and retrieving data from a database. It also can have slight variations depending on the specific implementation of SQL such as ANSI SQL, MySQL SQL, PostgreSQL SQL.
It's not necessarily difficult to learn, but it does take time and practice to become proficient in it. There are many resources available online that can help you learn SQL, such as tutorials, videos, and documentation, and many SQL tutorials are available for free. You can also practice by creating your own small databases and experimenting with different queries.
Question: An ILP problem has 5 binary decision variables. How many possible integer solutions are there to this problem? a. 5 b. 10 c. 25 d. 32.
The possible integer solutions to this problem are :
(d.) 32.
ILP stands for Integer Linear Programming, which is a method of optimization that entails finding the maximum or minimum of a linear objective function, subject to linear constraints where all the variables involved are limited to integers only.
A binary decision variable is one that can take one of two values: 0 or 1. Such variables are commonly used in optimization issues, particularly in mathematical optimization. Such variables are particularly useful in the production of logical statements, as well as decision-making processes.
Here, we are given that the ILP problem has 5 binary decision variables.
The number of possible solutions can be determined by calculating the total number of feasible solutions. The feasible solutions can be calculated as:
2 × 2 × 2 × 2 × 2 = 32
Thus, there are 32 possible integer solutions to the given problem. The answer is option d.
To learn more about ILP visit : https://brainly.com/question/27855584
#SPJ11
Create an infographics using the Word Processing Software, informing the audiences about internet safety practices.
Here is a suggested infographic on internet safety practices using Microsoft Word:
[A Word document shows the following infographic:]
Staying Safe Online
Protect your personal information. Never share your name, address, phone number, passwords, or Social Security Number on social media or public websites.
Be wary of phishing emails and malicious links. Never click links or download attachments from unknown or untrusted sources. Legitimate companies will not ask for sensitive data via email.
Use strong and unique passwords. A strong password contains a minimum of 8 characters, a mix of letters, numbers and symbols, and is not based on personal information. Use different passwords for different online accounts.
Be cautious of what you post. Anything you post online can potentially last forever. Do not post anything that you would not want seen by anyone.
Turn on two-factor authentication whenever possible. This adds an extra layer of security for your accounts like email, social media, and cloud storage services.
Ensure all devices and software are up to date. Install the latest updates to keep security patches current to protect against threats.
Be wary of public Wi-Fi networks. Public networks are not secure and all your online activity and information can be visible to others. Avoid conducting sensitive activities on public Wi-Fi.
Signal for help if anything suspicious happens. If you notice any suspicious activity on your accounts or devices, changing passwords or unauthorized logins, report it immediately to the concerned companies and consider filing a police report.
Online privacy and security is a shared responsibility. Be proactive and spread awareness about internet best practices to help keep everyone safe online. Together, we can make the internet a safer place!
Does this infographic look okay? I tried to highlight some key best practices around protecting personal information, using strong passwords, being cautious of what is posted online, enabling two-factor authentication, keeping software up to date, avoiding public Wi-Fi and knowing how to get help if needed. Please let me know if you would like me to modify anything in the infographic. I can also suggest some other topics or formatting styles if required.
A brief overview of some important internet safety practices that you can include in your infographic using the Word Processing Software is given.
How to explain the informationUse strong passwords: Use a combination of uppercase and lowercase letters, numbers, and symbols in your passwords, and avoid using personal information.
Enable two-factor authentication: Two-factor authentication provides an extra layer of security by requiring a second form of authentication in addition to your password.
Be careful with personal information: Don't share personal information like your full name, address, phone number, or social security number online.
Learn more about Word Processing on
https://brainly.com/question/985406
#SPJ1
What does
mean in computer science
Answer:
i think the answer is a character or characters that determine the action that is to be performed or considered.
Explanation:
hope this helps