1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
4 years ago
11

Ok so um does anyone know how i can use a divided by sign on computer?

Computers and Technology
2 answers:
Maslowich4 years ago
6 0
You can just put “/“ to represent dividing
Lady_Fox [76]4 years ago
5 0

Answer:

yes ÷

Explanation:

You might be interested in
Why are networked systems beneficial?
Alexxx [7]
A many periphels can be used
5 0
4 years ago
Read 2 more answers
Which of the following is not anadvantage of simulation?
kari74 [83]

Answer: Ability to derive optimal solutions

Explanation:

One of the main disadvantages of simulation is ability to derive optimal solutions. As, the solution does not required to have a closed form and  procedure does not require any weighting and the hard constraint.  Stimulation outcome are not optimal to induced specific response because of the lack of quantitative models.

3 0
3 years ago
Which type of computer graphic can be resized without affecting image quality or getting distorted?
BartSMP [9]
Vector graphics can be rescaled without losing quality and each property can be changed like the colour, shape and size. 

Even if an object in a vector large, it doesn't need a lot of memory. Hence, the file size of a vector graphic is often very small.


8 0
3 years ago
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
Given an integer variable i and a floating-point variable f, that have already been given values, write a statement that writes
Tju [1.3M]

Answer:

System.out.println("i = " + i + " f = " + f);

Explanation:

The code above has been written using Java's syntax.

To print or display statements to the console, one of the methods to use is the System.out.println() method.

According to the question, the statement to output is i=value-of-i f=value-of-f which is a string of texts.

Note that value-of-i and value-of-f are already stored in variables i and f respectively. Therefore to print them as part of the string text statement, it is important to concatenate them using the "+" operator as follows:

"i = " + i + " f = " + f

If the value of i is 25 and the value of f is 12.34 then the above statement, after successful concatenation reads:

"i = 25 f = 12.34"

which can then be shown on the console using System.out.println() method as follows:

System.out.println("i = " + i + " f = " + f);

Hope this helps!

8 0
3 years ago
Other questions:
  • Which cloud computing service model gives software developers access to multiple operating systems for testing?
    5·1 answer
  • Which ethernet cabling standard defines an ethernet network that uses cat 3 or better utp cabling, operating at 10mbps?
    8·1 answer
  • True or false? malware problems and other compromises of your computer information are rare.
    15·1 answer
  • The method header of the equals() method within the string class is ____.
    13·1 answer
  • For connection to place on any network you must have a set of standards?<br> O True<br> O False
    8·1 answer
  • An employee’s total weekly pay equals the hourly wage multiplied by the total number of regular hours plus any overtime pay. Ove
    13·1 answer
  • Design and implement a program (name it Youth) that reads from the user an integer values repressing age (say, age). The program
    6·1 answer
  • Which of the following identifies the goods or services of a
    15·2 answers
  • In which of the following scenarios would you choose to embed versus import data?
    8·1 answer
  • Define- Emerging technology
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!