1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
3 years ago
5

For C programming language, what does it mean when you have an exclamation mark after an equal sign? ie:

Computers and Technology
1 answer:
KiRa [710]3 years ago
3 0
It has to be firstly understood that the exclamation mark is not at all associated with the equal mark. The correct way to write it is <span>x = !y. This actually means that whenever "y" is true or false set, then it can be considered for sure that it returns zero or 1. I hope the answer has helped you.</span>
You might be interested in
What is the duty of business to contribute to the well-being of society
NikAS [45]

Answer:

To be able to explain what’s wrong and what needs to be done

Explanation:

So if your looking at a worksheet and the costumer needs help they are gonna ask you about it so your gonna need to be able to explain what’s going on and what needs to be/get done

5 0
3 years ago
In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and ins
Oduvanchick [21]

Answer:

MAN IN THE MIDDLE

Explanation:

Man in the middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties. When data is sent between a computer and a server, a cybercriminal can get in between and spy or eavesdrop.

A man in the middle attack can positions himself in a conversation between a user and an application in other to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

In a man-in-the-middle cyber-attack, the attacker places themselves in between two devices and monitor packets from the network, modifies them, and inserts them back into the network without the other parties knowing.

3 0
3 years ago
A man-in-the-middle attack or impersonation are likely to result in problems with
Ivan

Answer:

Data Confidentiality

Explanation:

A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.

6 0
3 years ago
Telecommunications is the transmission of voice and video as well as data and usually implies transmitting a longer distance tha
saul85 [17]

Answer:

The correct answer to the following question will be "True".

Explanation:

  • Telecommunication seems to be the transmitting by cable, antenna, optical or other electromagnetic networks of signs, commands, letters, words, texts, pictures, and sounds, or knowledge of any kind.
  • This happens when the use of technologies involves the information exchange between participants in the conversation.

Therefore, the given statement is true.

6 0
3 years ago
PLEASE ANSWER ASAP!! Where is the findmore answers page I NEEDDD the bsdge
asambeis [7]

Answer:

hi earlier u told me to answer ur question but i couldn't respond in the comments cos it said something went wrong

Explanation:

do i answer this question seriously or is this answer good?? srry im kinda dûmb T-T

3 0
2 years ago
Other questions:
  • Due to the internal style sheets of some browsers, your website may look different to someone who is using firefox as opposed to
    11·1 answer
  • Which of the following is a goal of paraphrasing​
    12·1 answer
  • Which best describes the relationship between maximum cost-per-click (max. cpc) bids and ad rank?
    12·1 answer
  • Approximately what percent of desktop PCs are used for work-related purposes?
    12·1 answer
  • "2. what are the advantages and disadvantages of using the serial console connection compared to the usb console connection to a
    15·1 answer
  • To under a clip art you must do the following.
    14·1 answer
  • Why do we need vram​
    6·1 answer
  • Please help quickly!!! which of the following is not a peripheral?
    8·2 answers
  • I nees the meaning of these words even just one of them would help out ( pixel megapixel colour depth bit and byte)
    15·2 answers
  • Exercise 3.6.9: 24 vs. "24"5 points
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!