1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rusak2 [61]
3 years ago
8

Write a program that inputs two characters first and second, and then prints all non-alphabetic characters starting from second

until the first ?
Computers and Technology
1 answer:
baherus [9]3 years ago
8 0

Answer:

fbtcft gdfgfffff tvfft gxf

You might be interested in
Similarities between drawing toolbar and editing toolbar​
topjm [15]

Answer:

dk

Explanation:

3 0
2 years ago
Read 2 more answers
A(n) _____ is a local connection point-of-presence that connects a variety of high-performance networks, and its main function i
kirza4 [7]

Answer:

GigaPOP

Explanation:

<em>A gigabit point of presence, also known as GigaPOP is a single entry point to Internet2, which is a high-speed IP network managed by institutions and other organizations. Gigabit Points of Presence generally handle data transmission rates of one gigabit per second or more.</em>

8 0
1 year ago
Raina remembered when she taught Amara to draw. What happened?
Serga [27]

Sisters is an autobiographical graphic novel written by Raina Telgemeier as a follow-up to her earlier graphic memoir Smile. It details a long summer road trip taken from San Francisco to Colorado by her family and explores the relationship between Raina and her younger sister, Amara.

<em>-</em><em> </em><em>BRAINLIEST</em><em> answerer</em>

6 0
2 years ago
Please explain why an operating system makes a great attack target.​
BartSMP [9]
The operating system is the fundamental controller of all system resources
Operating system popularity is one major reason why hackers attack
Window is a big target because it powers the vast majority of the world’s desktop computers and laptops.
To steal personal and protected health information
To steal user credit card numbers and other financial data
To harm the system or disrupt business operations of any organization
To gain competitive edge over opponents
To spoil the reputation of an organization

If you want answer to question 19, put a Thanks and comment that you want answer to question 19
8 0
2 years ago
Debevec mentions using the technology he described to animate entire human bodies. Discuss why you think this is or is not a goo
snow_tiger [21]

Answer:

Debevec is using the light of his team because this and that and because it’s manipulated

Explanation:

8 0
2 years ago
Other questions:
  • Harry is creating a presentation for a school event. He has to deliver the presentation to a huge audience. What should he keep
    14·2 answers
  • Okay so, not really a question but whatever it’s been bothering me.
    9·2 answers
  • Clep allows students to do all of thw following except which?
    11·2 answers
  • What is the difference between primary storage,secondary storage and offline storage what type of storage can be
    6·2 answers
  • Write a program that continually prompts the user for an integer input until input is entered that is less than 0. Each input th
    9·1 answer
  • How can the function anotherFunc2 change the contents of the second element of t?
    5·1 answer
  • Select each task that may be completed using a word processor.
    8·2 answers
  • A--------- provides an easy way to enter or display a record​
    5·2 answers
  • The reason why our computers can get faster without getting bigger is because of...
    14·1 answer
  • Identify five type of application software​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!