1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
2 years ago
12

The symbol located to the left of a code number that identifies a code description that has been revised is _____.

Computers and Technology
1 answer:
Ronch [10]2 years ago
3 0

Answer:

"Triangle" is the right answer.

Explanation:

  • Positioned or installed to something like the left including its compiler, this same code interpretation has indeed been modified throughout the standard requirements of that same CPT.  
  • It designates a characterization of the compiler as well as the written code which has already been rewritten or changed.  

Therefore this statement is correct.

You might be interested in
You are now going to prepare some reports for the company. Measurements are in metres and volume
romanna [79]

if you follow me and like and mark in brainliest answer only I will tell the answer

4 0
2 years ago
4. In Drag and Drop method of Excel , to copy the data , you need to press __________ key while dragging the cells.
alexgriva [62]

Answer:

The <u>control</u> [Ctrl] key

Explanation:

While holding down left click and pressing control key it will copy to where you drag and drop it.

6 0
2 years ago
A company is looking for an employee to design and test connections in its
kolbaska11 [484]

The employee that design and test connections in its computer systems is in the computer architecture field.

<h3>What is design and test connections?</h3>

This is known to be a field in computer system where system engineers makes a lot of computer designs and also involve in testing of connections such as internet connections, etc.

Note that The employee that design and test connections in its computer systems is in the computer architecture field and they are known to be Computer software engineers

Learn more about  Computer jobs from

brainly.com/question/24588527

#SPJ1

8 0
1 year ago
Tablets combine the features of which two types of devices?
VikaD [51]
A tablet<span> is a wireless, portable personal computer with a touchscreen interface. The </span>tablet<span> form factor is typically smaller than a notebook computer, but larger than a smartphone.
</span>
5 0
2 years ago
Which of the following is part of the cycle of dating violence
katen-ka-za [31]

Dating violence is a pattern of behavior where one person threatens or actually use

Physical, sexual, emotional, or verbal abuse to control his or her dating partner.

Examples of physical abuse are

Hitting, shoving, kicking

Examples of sexual abuse are

touches you when you don't want them to, forces you to watch dirty things,  

intercourse, fondling, exhibitionism, voyeurism, exploitation, prostitution & exposure to body parts.

Examples of verbal and emotional abuse

Insults, belittling, name calling, blaming, humiliation & false accusations.

Abuse is a

The deliberate infliction of harm or the threat of harm to a vulnerable person

Abusers in teen dating relationships, use behaviors of

Fear and intimidation

The only person that can choose to stop the violence is the

Abused.

Signs of an abused teen

Do poorly in school, have low self-esteem, may cry frequently, & may have trouble learning.

Abused teens even contemplate or attempt

Suicide

1 in 11 teens report being victims

Physical dating violence each year.

6 0
3 years ago
Other questions:
  • Ryan is looking at investment opportunities as a cloud service provider. He wants to invest in a deployment-based cloud model th
    11·2 answers
  • How many people employed in the United States work in a job related to digital media?
    12·1 answer
  • Firefox, Chrome, Opera, and Safari are examples of
    15·1 answer
  • Which of the following should you do if your accelerator is stuck? A. Pump your brakes to build fluid pressure. B. Shift to Neut
    14·2 answers
  • What is the primary means by which attackers infect computers with these attacks? How do these attacks commonly occur?
    8·1 answer
  • Your network has four Hyper-V hosts, which are running three domain controllers and about 10 member servers. Three of the member
    10·1 answer
  • Write a method doubleUp that doubles the size of a list of integers by doubling-up each element in the list. Assume there's enou
    13·1 answer
  • 3.6 Code Practice Edhesive. (PYTHON LANGUAGE)
    13·1 answer
  • A file manager is used for all of the following except ____.
    12·1 answer
  • What are the tools in creating an animation?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!