1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkasestr [34]
3 years ago
14

If\s*.*[><]=.*\s*: what does this mean

Computers and Technology
1 answer:
trasher [3.6K]3 years ago
5 0

You know that means if you use c++

you need to put something in this

#include<iostream>

using namespace std;

int what_ you_ want;

int main ()

{

cout<<"WHAT DO U WANT"; cin>>what_you_want;

if (what_you_want<1000)

and then use {, else, } return 0;

but it is good for c++


You might be interested in
2. Input a decimal number and test if it is not equal to 16.5.
lubasha [3.4K]

Answer:

2:

decNum = float(input("Decimal number: "))

if decNum != 16.5:

   print("Does not equal")

elif decNum == 16.5:

   print("Equal")

else:

   pass

3:

if x > 57:

   x += 4

   print(x)

4:

numOne = int(input("Enter number: "))

numTwo = int(input("Enter number: "))

if numOne < 100 and numTwo < 100:

   yes = numOne + numTwo

   print(yes // 2)

else:

   pass

Explanation:

Please give me brainliest.

6 0
2 years ago
What are the implications for a company that relies solely on technology to store all of their data ?
romanna [79]

A store that relies solely on technology to store all of their data would be a store that either sells technology or an online store like Amazon

3 0
3 years ago
Which of the following items is an example of a user application? *
aleksandr82 [10.1K]

Answer:

I would probably say all of the above!

Explanation:

4 0
3 years ago
Read 2 more answers
In a database, data is stored in spreadsheets which have rows and columns.
Tcecarenko [31]
The answer is A. True.
5 0
3 years ago
List at least four items that security policy should include
forsale [732]

Answer:

Purpose.

Audience.

Information security objectives.

Authority and access control policy.

Data classification.

Data support and operations.

Security awareness and behavior.

Encryption policy.

4 0
2 years ago
Other questions:
  • This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while
    8·1 answer
  • A Unit of information containing the objects position, rotation, and scale values is called:
    13·1 answer
  • List the steps in setting up an online banking account
    12·2 answers
  • A computer is performing a binary search on the sorted list of 7 numbers below.
    10·2 answers
  • Hey does anyone know the name of that movie where like this teenage girl is chilling at her house then there is an outbreak of s
    6·1 answer
  • Which of these expressions is used to check whether number is equal to value?
    15·2 answers
  • Debugging 2.17.3: Debug: The Two Towers Code Hs
    15·1 answer
  • 1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
    10·1 answer
  • Why should you keep lines of code short?
    15·1 answer
  • Importance of software in computer​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!