1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murljashka [212]
3 years ago
12

3. Which of the following is called address operator? a)* b) & c). d) %

Computers and Technology
1 answer:
34kurt3 years ago
5 0

Answer:

The Ampersand Symbol (Option B)

Explanation:

A 'address of operator' specifies that a given value that is read needs to be stored at the address of 'x'.

The address operator is represented by the ampersand symbol. ( & )

Hope this helps.

You might be interested in
television broadcasts were originally delivered by using which technology? ethernet wireless coaxial cable broadband
laiz [17]

Television broadcasts were originally delivered by using:

  • Ethernet
  • Coaxial cable
  • [Wireless] or  Broadband

<h3>What is Ethernet is used for?</h3>

Ethernet is known to be a kind of network or services that is often used to link two or more devices in a network.

This is known to be very  popular kind of network connection. It is known to be used in  local networks by specific organizations such as offices, school campuses and  it is used often for Television broadcasts.

Therefore,  Television broadcasts were originally delivered by using:

  • Ethernet
  • Coaxial cable
  • [Wireless] or  Broadband

Learn more about Ethernet from

brainly.com/question/1637942

#SPJ1

7 0
1 year ago
What is true about content based filtering
AleksAgata [21]

Answer: provide more info

Explanation:

8 0
3 years ago
Company A has a project plan for a new product under development. The product will be one of many released in the coming year. T
gizmo_the_mogwai [7]

Answer:

Company A

The ISO 27002 classification level that is most likely assigned to this document is:

b) Proprietary

Explanation:

The ISO 27002 classification levels adopted by commercial organizations are Restricted (top secret is preferred in government circles), Confidential, Internal (or proprietary), and Public. Since the new product is under development, one of many, and most likely known to the project team, the project plan will be classified as Proprietary.  Company A designates this document as Proprietary or Internal to show that disclosure of the information to its competitors is not allowed.  This level of classification shows that Company A can establish intellectual property rights over the document.

4 0
3 years ago
--------------communication involves one speaker andaudience.
dalvyx [7]

Answer:

Person-to-Group

Explanation:

Person-to-Group communication involves one speaker and audience.

6 0
3 years ago
Produce a program using a loop that requests for 8 floating point numbers from a user.once provided the program should calculate
kati45 [8]

Answer:

The program in Python is as follows:

total = 0

count = 0

for i in range(8):

   num = float(input())

   if num < 10.5:

       total+=num

       count+=1

print("Average: ",total/count)

Explanation:

This initializes the total to 0

total = 0

This initializes the count to 0

count = 0

This loop is executed 8 times

for i in range(8):

This request for float number

   num = float(input())

If input is less than 10.5

   if num < 10.5:

The sum is taken

       total+=num

And count is incremented by 1

       count+=1

The loop ends here

This calculates and prints the average

print("Average: ",total/count)

7 0
3 years ago
Other questions:
  • You have developed a prototype of a software system and your manager is very impressed by it. She proposes that it should be put
    5·1 answer
  • The birthday problem is as follows: given a group of n people in a room, what is the probability that two or more of them have t
    15·1 answer
  • While reading difficult content, you should always start witha.Surveying the chapterc.Reading the chapterb.Defining vocabulary w
    8·1 answer
  • You complete your database, and the company begins using it. Shortly afterwards, two GearUp buyers, Cora and Owen, work together
    9·1 answer
  • I'd: 9872093250, password: qqqqq, join the meeting​
    11·1 answer
  • Why can it be helpful to perform mathematical calculations using programming? Choose the best answer.
    11·1 answer
  • What are the top 10 most dangerous computer viruses ?
    13·1 answer
  • Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning
    14·1 answer
  • C
    8·1 answer
  • Question 7 Consider the following code:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!