1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slava [35]
3 years ago
10

Please reply only in CORAL. I am not sure how to get the numbers between the negative version and positive version of the input

Computers and Technology
1 answer:
Veseljchak [2.6K]3 years ago
4 0

Answer:

I have the solution.

Explanation:

Feel free to reach out. Thanks!

You might be interested in
What is the purpose of citations?
Elina [12.6K]

Answer: Citiations areto show where you got information from.

Explanation:

6 0
4 years ago
Which Windows feature allows secure printing over the Internet?​
ludmilkaskok [199]

Answer:

You need to install Windows 7 over an existing version of Windows.

Explanation:

Brainiest??

3 0
3 years ago
Brainliest to Best Answer!
Shtirlitz [24]
ArrayIndexOutOfBoundsException
because it includes the extra info that you tried (and failed) to access an array
8 0
3 years ago
Match each Excel term to its definition. cell a group of cells containing related data ribbon a row of tabs, groups, and command
Artist 52 [7]

Answer:

ribbon- a row of tabs, groups, and commands

range- a group of cells containing related data

title bar- file name

cell- a container used to input data

worksheet- Excel’s version of a spreadsheet

Explanation:

6 0
3 years ago
You work as the IT security administrator for a small corporate network. You have designed the physical security of the offices
ladessa [460]

The security IT administrator he or she is planning to install smart card communications over the network which is can be access through TCP IP address.

Smart card key reader to be placed or installed where is required  such as an opening door  or entrance of office or organization extra.

Key card readers should be contactless and record more volume of data and it should synchized with the system at regular intervals.

By Installing smart card and it readers unauthorized  person entry to lab or network server can be avoided. Since smart card reader connected to the network, IT SECURITY administrator can generate log reports.

5 0
3 years ago
Other questions:
  • When desktop publishing software can interact with another software program, the two are said to
    6·1 answer
  • Which of the following savings vehicles usually requires a high minimum balance
    14·1 answer
  • Modify your solution to Problem 8.24 so that one (and only one) child installs a Segmentation-fault handler which prints an erro
    10·1 answer
  • What is the minimum number of data points you should usually have to look for signs of improvement on a run chart?
    8·1 answer
  • A user has called the company help desk to inform them that their Wi-Fi enabled mobile device has been stolen. A support ticket
    13·1 answer
  • Get someone get her for me if need snap kell.c11
    10·1 answer
  • Write fade in shorthand​
    11·1 answer
  • The four differences between binary and denary​
    13·1 answer
  • which search engine technology prevents a website from appearing in numerous top positions in the search engine result pages?
    11·1 answer
  • How do I find unwanted programs on my computer?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!