1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
velikii [3]
3 years ago
9

Tamara is writing a program to organize students in a class and needs to use operators to organize student grades, then compare

the results of that to each other. What kinds of operators does Tamara need to use for each step?
Tamara needs to use
operators to organize the students' grades, then
operators to compare the results.
Computers and Technology
1 answer:
VMariaS [17]3 years ago
3 0

Answer:   you said "Tamara needs to use

operators to organize the students' grades, then

operators to compare the results."

i think your right

Explanation:

sounds right.

You might be interested in
A group of two or more computer systems linked together via communication devices is called:.
ioda

A group of two or more computer systems linked together via communication devices is called: A Network

5 0
3 years ago
The term “gigahertz” refers to how many cycles per second? One thousand One hundred One billion One million
Genrish500 [490]
"giga" is the prefix denoting "billion," so gigahertz means "billion hertz"

Therefore answer is One Billion
4 0
3 years ago
Which destination ip address is used when an ipv6 host sends a dhcpv6 solicit message to locate a dhcpv6 server?
Dvinal [7]
Ff02::1:2


---------------------------
7 0
4 years ago
What is the answers please
Gre4nikov [31]
which question are u referring too
6 0
3 years ago
Describe two measures you can use to evaluate whether an attachment in a message is reliable to open.
meriva
<span>If a attachment is not reliable to open, terrible effects can happen, peradventure it may have a virus or even malware that can destroy a computers software. 

To avoid this and stay on the safe side, try the following:-

- Open it in protected view 
- Do not save the attachment on your computer 
- Look at the author and read the message carefully to make sure it is not biased. 
- Open it on a flash-drive </span>
8 0
3 years ago
Read 2 more answers
Other questions:
  • Which component of the Hyper-V architecture controls all communication with the physical hardware on the computer?
    8·1 answer
  • In which type of land contract does the seller earn interest on the difference between what the seller owes on an existing loan
    14·1 answer
  • When naming a file to upload into an assignment in blackboard, it is okay to use special characters?
    13·1 answer
  • Declare an array named tax rates of five elements of type double and initialize the elements (starting with the first) to the va
    12·1 answer
  • RrayList Mystery Consider the following method:
    9·1 answer
  • For each recursive call, display the outputs on a separate line and add a level of indentation. do your utmost to make the outpu
    10·1 answer
  • The getting started screen in Microsoft publisher consists of which main parts?​
    7·1 answer
  • Write a recursive function is_pow2(n) that returns True if the positive integer n is an integer power of 2, and False otherwise.
    9·1 answer
  • Can we update App Store in any apple device. (because my device is kinda old and if want to download the recent apps it aint sho
    10·1 answer
  • What type pf physical security devices lets a company locate devices that have been moved to a new location?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!