1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrews [41]
3 years ago
12

when you create a formula, you'll always start by typing the ________ sign. a. (plus) b. = (equals) c. /(slash) d. ˆ(caret)

Computers and Technology
2 answers:
Dmitry [639]3 years ago
5 0
When doing a formula start by doing equals sign which the answer is B.
Scorpion4ik [409]3 years ago
4 0
You have to put the equal sign , so B)
You might be interested in
Assume you have a sorting algorithm that you can use as a black box. Use the sorting algorithm to sort the input list. Now write
Ber [7]

Answer:

Algorithm explained below

Explanation:

Algorithm to check duplicate when list of element is sorted:

CheckDuplicate( Sorted list )

    initialize count = 0

    Repeat untill we reach on end of list :

            if next is not end of list and current element is equal to next element

                    count = count+1

                    increase the pointer to next untill a different element is found

end CheckDuplicate

Worst Case Time Complexity will be O(n). Because there is only one iteration over the list will be performed.

Yes We have improved the worst case time complexity compared to previous question.

Actually after applying sorting all the similar element to will be next to each other.Then we will start iterating one by one from one side and check which is similar to next.If a different element will be find then we will check whether it's next is similar to it or not.

eg. 1 1 1 2 2 2 4 4 4 we can check duplicate in one iteration.

7 0
3 years ago
Is spin to win paying or is a scam app​
maria [59]

Answer:

scam bro.

Explanation:

4 0
3 years ago
Read 2 more answers
You are managing an FTP server installed in Ubuntu Server. The server has created a very large log le, vsftpd.log. Which command
kirill115 [55]

Answer:

c. sudo grep "charlie" /var/log/vsftpd.log

Explanation:

  • sudo is used to access /var/log files since it requires superuser access
  • grep command is used to search for a string of characters in a specified file
  • "charlie" is the string searched in the log files
  • /var/log/ is where the log files are in linux systems
5 0
3 years ago
You want to use a wireless keyboard and mouse with your laptop computer. which method should you use
Viefleur [7K]
If someone wants to use a wireless keyboard and mouse with a laptop computer, below are the steps.

First check if there’s a USB receiver attached to the mouse or keyboard. If there is, see below steps.

1. Connect the USB receiver of both mouse and keyboard into the USB port of your laptop computer. Some USB dongle would ask you to install or add it your device, just click OK and then add.
2. Make sure that the batteries on your wireless keyboard and mouse are working. And also check if the keyboard and mouse are turned on or have power.
3. Check if there’s a “connected” indication for both wireless mouse and keyboard on your laptop. You can now use your wireless mouse and keyboard on your laptop.

If there’s no USB receiver, and you’re using a bluetooth wireless mouse and keyboard, below are some steps to follow.

1. Turn on bluetooth connection on your laptop.
2. Make sure that batteries are working and turn on both wireless mouse and keyboard.
3. On your laptop, find your wireless mouse and keyboard under bluetooth option and connect the devices. You can now use your wireless bluetooth mouse and keyboard for laptop.
4 0
3 years ago
What keys on the keyboard have the ability to move the cursor around on a window?
madreJ [45]

Answer:

Press the Windows key on your keyboard. In the box that appears, type Ease of Access mouse settings and press Enter . In the Mouse Keys section, toggle the switch under Use numeric pad to move mouse around the screen to On. Press Alt + F4 to exit this menu.

8 0
3 years ago
Other questions:
  • Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?
    12·1 answer
  • During an experiment, if you purpose change the temperature to test a hypothesis the temperature is called what??
    6·1 answer
  • Question 1 (1 point)
    10·2 answers
  • During the ________ phase of the systems development life cycle process, developers construct, install, and test the components
    13·1 answer
  • A speaker takes a variety of information from the results of a web search, and puts it together in an outline to make up his spe
    8·1 answer
  • For what purpose is keylogging software used? a. To automatically translate input to another language as the user enters data b.
    10·1 answer
  • Impaired drivers are one of the many risks drivers face on the Highway Transportation System. List 3 signs that a driver could b
    10·2 answers
  • Please tell fast plzzzzzzz​
    11·1 answer
  • The __________ gear is the input gear.<br> A. Drive<br> B. Driven
    5·2 answers
  • k-means clustering cannot be used to perform hierarchical clustering as it requires k (number of clusters) as an input parameter
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!