1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
5

I dont know how to put the negative sigh on my computer

Computers and Technology
2 answers:
valina [46]3 years ago
8 0
You put the dash on the right side up top ape
Tpy6a [65]3 years ago
4 0

Answer:

its ok not to be okay uhm

You might be interested in
In a(n) ____, the programmer uses a programming language (in context free grammar) to tell the computer what to accomplish and h
Mamont248 [21]

A 5GL fifth-generation languages a programming language design to solve given problem without programmer. The user only needs to solve the problem and condition without implementing an algorithm.

Explanation:

First Generation Language

The first generation language is called low- level style because they were used at a superficial level of abstraction. First-generation language referred to as the native language.

Second Generation Language

The second-generation language is also low-level language or assembly language. The second level of language uses the concept of mnemonics for the writing program. Symbolic name are used.

Third Generation Language

The third-generation language overcomes the first and second-generation languages. Third generation language is considered as high- level language because the target is to focus on the logic of the program.

Fourth Generation Language

The language of generation required a lot of time and effort that affect programmers.The fourth-generation was developed to reduce the time, cost, and effort.

Fifth Generation Language

The programming language of this generation focuses on constraints programming. The fifth-generation programming languages are Artificial Intelligence and Artificial Neural Network.

6 0
3 years ago
Password ____ traverse the network searching for passwords from remote authentication systems.
irga5000 [103]

The correct answer is scanners.

<h3>what is password?</h3>

A password is a group of letters and numbers that is used to confirm a user's identity throughout the authentication process. Passwords are frequently used in conjunction with usernames; they are created to be known only by the user and grant access to a device, application, or website on their behalf. Letters, numbers, and special characters can all be used in passwords, and their length can vary.

When a password contains more than one word, it may be referred to as a passphrase. When a password contains solely digits, such as a personal identification number, it may be referred to as a passcode or passkey (PIN).

learn more about password refer:

brainly.com/question/15569196

#SPJ4

3 0
2 years ago
Please select the word from the list that best fits the definition
ElenaW [278]

bro what thats rly vague?

6 0
3 years ago
Read 2 more answers
Does coaxial cable use radio waves to transmit data
Elan Coil [88]
Coaxial cable<span>, or </span>coax<span> (pronounced </span><span>/<span>ˈkoʊ.æks</span>/</span><span>), is a type of </span>cable<span> that has an inner conductor surrounded by a tubular insulating layer, surrounded by a tubular conducting shield. Many coaxial cables also have an insulating outer sheath or jacket. The term </span>coaxial<span> comes from the inner conductor and the outer shield sharing a geometric axis. Coaxial cable was invented by English engineer and mathematician </span>Oliver Heaviside, who patented the design in 1880.[1]<span> Coaxial cable differs from other </span>shielded cable<span> used for carrying lower-frequency signals, in that the dimensions of the cable are controlled to give a precise, constant conductor spacing, which is needed for it to function efficiently as a </span>transmission line<span>.</span>
5 0
3 years ago
Read 2 more answers
An example of phishing is: Select one: a. flooding a web server with thousands of requests for service. b. setting up a fake med
tigry1 [53]

Answer:

Option(b) is the correct answer to the given question.

Explanation:

The main objective of the Phishing to posing as a legitimate entity and trick the individuals to sharing her confidential information like information of banking details such as credit card number  and passwords etc.

Phishing is done with the help of email, telephone or etc. Sometime phishing is done by the web page and stolen the website password. Phishing provides financial loss to the individual as well as the organization.

Except for option(b) all the options are not examples of Phishing that's why they are incorrect Options.

7 0
4 years ago
Read 2 more answers
Other questions:
  • Complete the function to replace any period by an exclamation point. Ex: "Hello. I'm Miley. Nice to meet you." becomes:
    9·1 answer
  • Determine the efficiency and big-O notation for the following algorithm:
    13·1 answer
  • The __________ of a desktop computer is the case that houses the computerâs critical parts, such as the processing and storage d
    5·1 answer
  • Use BlueJ to write a program that reads a sequence of data for several car objects from an input file. It stores the data in an
    5·1 answer
  • What does DOS stand for?
    15·1 answer
  • James gets a job at a multinational corporation. On his first day at work, he finds out that the numerical code assigned by the
    10·1 answer
  • Anna wants to keep information secure from offenders. Which software should she install on her computer to ensure Internet safet
    13·1 answer
  • What is difference between augmented reality and mixed reality?​
    11·1 answer
  • Hey does anyone know any sites like you tube i can watch on my school chrome book or tell me how to unblock sites cause everythi
    8·1 answer
  • You want to read input from the user to know how many apples they would like
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!