1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadusha1986 [10]
3 years ago
8

What is the function of this logical comparator! =?

Computers and Technology
1 answer:
rewona [7]3 years ago
3 0

Answer:

See explanation

Explanation:

!= means not equal

The given operator is not a logical operator but rather a comparison operator.

It compares two expressions, values or variables and returns true if the items being compared are not equal.

You might be interested in
Global address list characteristics
Usimov [2.4K]

I DON'T KNOW THE ANSWER SO SORRY

BUT THANKS FOR THE POINTS

5 0
3 years ago
Sarah used a grid to create this layout for a website. Which rule of composition did Sarah use for the grid?
Nana76 [90]

Answer:

B rule of thirds

Explanation:

4 0
3 years ago
Read 2 more answers
A tool that is used to search for and gather data from a page on the internet is called a ?
pshichka [43]
It is called a sesrc engine
8 0
3 years ago
Read 2 more answers
Input two numbers and print their sum products difference division and remainder​
likoan [24]

\tt n1=int(input("Enter\: first\:no:"))

\tt n2=int(input("Enter\: second\:no:"))

\tt sum=n1+n2

\tt diff=n1-n2

\tt pdt=n1*n2

\tt div=n1//n2

\tt rem=n1\%n2

\tt print("Sum=",sum)

\tt print("Difference=",diff)

\tt print("Product=",pdt)

\tt print ("Division=",div)

\tt print("Remainder=",rem)

Output:-

Enter first no:4

Enter second no:3

Sum=7

Difference=1

Product=12

Division=1

Remainder=1

7 0
3 years ago
What technique is most commonly associated with the use of malicious flash drives by penetration testers
nasty-shy [4]

Answer: Distributing malicious flash drives in a parking lot or other high-traffic area, often with a label that will tempt the person who finds it into plugging it in, is a technique used by penetration testers.

Explanation:

4 0
2 years ago
Other questions:
  • What is a geotag?
    10·1 answer
  • 안녕하세요! 한국어도 여기서 사용 가능한지 궁금합니다.
    6·2 answers
  • When did the digital revolution begin
    10·1 answer
  • The computer component that makes sure that instructions are decoded and executed properly is the ___________.
    11·2 answers
  • You would like to know how many cells contain data. Which function should you use?
    11·1 answer
  • What malware looks like a useful or desired executable program but is, in reality, a program that is supposed to cause harm to y
    11·1 answer
  • A _______ template is used to maintain consistency in terms of margins and page numbers .
    6·1 answer
  • Generally speaking, what is a “best practice"?
    13·1 answer
  • Difference between switch and switch lite
    10·1 answer
  • How do you modify WordArt? Give specific details and steps<br><br> NEED THIS ASAP
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!