1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
5

I dont know how to put the negative sigh on my computer

Computers and Technology
2 answers:
valina [46]3 years ago
8 0
You put the dash on the right side up top ape
Tpy6a [65]3 years ago
4 0

Answer:

its ok not to be okay uhm

You might be interested in
Create a program that has at least three classes. The class with main. A class that defines a Name (first name, middle name, and
Bond [772]

Answer:

See attached file for complete detailed code.

Explanation:

See attached file.

Download txt
3 0
3 years ago
Which extra step do verizon devices require for fenrir to be allowed to connect to the device?
madam [21]

Differentiation creates a competitive edge based on the distinctiveness of the product. Uniqueness is created by a variety of potential factors.

<h3>What is the Verizon device program?</h3>

The program for device payments: requires you to sign a contract promising to pay for the item in regular installments until the balance is paid. You have the option of paying the gadget off in full at any moment, or you can pay the installments over the course of the entire term.

Instead of paying for your equipment in full up front, Verizon device payment allows you the freedom to upgrade early and spread out your payments over 36 months. Until the full retail price of your item is paid off, you'll make manageable monthly payments.

Differentiation is Verizon's general business approach. Differentiation creates a competitive edge based on the distinctiveness of the product. Uniqueness is created by a variety of potential factors.

To learn more about the Verizon device program refer to:

brainly.com/question/13696647

#SPJ4

8 0
2 years ago
Question 5 of 10
Drupady [299]
The programs you need for you are not even done yet
3 0
2 years ago
What computer worm was used to sabatoge iran's nuclear program?
Stels [109]
Researches at symantec have uncovered a version of the stuxnet computer virus that was used to attack irans nuclear program in November.
4 0
3 years ago
What is another word for violation
serg [7]

Answer:

Infringement

Explanation:

The others are incorrect

4 0
3 years ago
Other questions:
  • A ___________ is an algorithm for which it is computationally infeasible to find either (a) a data object that maps to a pre-spe
    5·1 answer
  • If a function needs to return more than one value, as a rule of good programming style, you should change it to a(n) ___________
    6·1 answer
  • What runs horizontally and is identified with numbers?
    12·2 answers
  • how to answer the questions on brainly? I've typed my answer in the box but there's no submit button or whatever, and the only t
    14·2 answers
  • Discuss the importance of employee security awareness training. What innovative ways should company’s implement security trainin
    14·1 answer
  • Internet is for everyone but it wont be if its users cannot protect their privacy and the confidentiality of transactions conduc
    6·1 answer
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    11·1 answer
  • Assume a TCP sender is continuously sending 1,090-byte segments. If a TCP receiver advertises a window size of 5,718 bytes, and
    7·1 answer
  • Every single device can be connected to every other device on network, making the network mesh. This statement is True or False?
    8·1 answer
  • I have no idea which one please help!
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!