are special characters usually found on the keyboard?

Answers

Answer 1

Answer:

No

Explanation:

When typing in predefined characters, Automatic substitution feature will change the characters into a symbol or special character. No.


Related Questions

Does anyone know how to write this right? This is for a coding class and I’m super confused on it.

First activity:

1. Declare three variables: firstSnack,
second Snack, and thirdSnack.
Assign the name of a snack (as a string)
to each variable.

2. Declare another variable and call it
bestSnack.
Assign a value to bestSnack USING THE
NAME OF ONE OF THE ABOVE VARIABLES.
Do not use a string directly.

3. Now, change your mind! Reassign the value
of bestSnack, again using the variable name,
not the string. (THIS SHOULD BE DONE ON
A NEW LINE)

Second activity:

4. Declare three variables and give them the names of three common grocery items. Assign to each variable a NUMBER value approximately its price. Don’t use $ sign, just the actual number.

5. Declare another variable, name it total, and assign to it the SUM of the three other variables, contain. Hint - you’ll need to use an arithmetic operator to do this.

Answers

Answer:

This is using c++ syntax, you might need to make slight adjustment for other languages.

First activity:

string firstSnack = "chips";

string secondSnack = "pizza";

string thirdSnack = "apples";

string bestSnack =  firstSnack;

bestSnack = secondSnack;

Second activity:

double apple = 0.5;

double banana = 0.75;

double orange = 1.43;

double total = apple + banana + orange;

Explanation:

When first declaring a variable, you want to specify the type (such as int, double, string, bool, etc.) and then the name. You can set the variable value in the declaration, or you can set it to a value later in the program by not having the equals sign and whatever comes next.

What language do programmers use to communicate with a computer?

Input code
Linguistic code
Programming code
Virtual code

Answers

Answer:

I would say programming code

Explanation:

Since its a system of rules written in a particular programming language

The language that programmers use to communicate with a computer is called "Programming code".

The correct option is C.

Programming code is the language that is used by developers to create software programs, applications, and websites. These languages are based on a set of instructions that tell the computer what to do.

Programming languages can be divided into two categories: low-level and high-level.

Low-level languages are closer to the binary code that computers use to execute instructions.

High-level languages are more abstract and easier for humans to understand and use.

Examples of high-level languages include Python, Java, JavaScript, and C++.

Programmers use programming languages to create algorithms and procedures that the computer can follow to complete tasks. This involves writing code that is syntactically correct and logically sound. Once the code is written, it must be compiled or interpreted by the computer so that it can be executed.

Know more about programming language,

https://brainly.com/question/23959041

#SPJ3

I will make you brainless Just answer this question!!!!

A. Arrange the follow stpes chronologically.Write A the first step,Bfor the second and so on...​

Answers

Answer:

6, 8,5,3,4,1,9,2,7

Explanation:

Just like that

Answer:

6, 8, 1, 3, 4, 2, 9, 5, 7

how to install windows 11 on unsupported processor

Answers

Answer: You can't, if you anyway bypass the system, your device will run on risk.

Suggestion: Use any Linux distro similar windows 11. Like - Ubuntu/ Linux Mint/ ElementaryOs.

(Suggestion is only for if you can't run windows 10 or the pre installed Operating System in your machine.)

what are the seven phases of design plans that the main features of designer-client communication at each phase

Answers

Answer:

Step 1 – Study the Client Brief. ...

Step 2 – Research, Research, Research. ...

Step 3 – Brainstorm. ...

Step 4 – Sketch. ...

Step 5 – Concept Development. ...

Step 6 – Revisions. ...

Step 7 – Completion.

Explanation:

what level of system and network is required for cui

Answers

Answer:

CUI will be classified at a “moderate” confidentiality level and follow DoDI 8500.01 and 8510.01 in all DOD systems. Non-DoD systems must provide adequate security with requirements incorporated into all legal documents with non-DoD entities following DoDI 8582.01 guideline

Explanation:

the first fully 64 bit compatible version of android is:

Answers

Answer:

Android 5.0 Lollipop, I hope this helped.

Answer:

The version of the first 64 bit andriod ia the version called: Andriod 5.0 lolipop

Hope this help please give the brainliest award.

Order the steps to describe how to attach a contact to a new email

Answers

Answer:

confirm image correct

Explanation:

What refers to the place you drag and drop blocks to create instructions in Scratch?

A.
playground

B.
sprite

C.
editor

D.
environment

Answers

Answer:

It is called the editor script area, hence the name is where you create and edit code.

Hope this help please give the brainliest award.

n (m,n) correlating branch predictor uses the behavior of the most recent m executed branches to choose from 2m predictors, each of which is an n- bit predictor. A two-level local predictor works in a similar fashion, but only keeps track of the past behavior of each individual branch to predict future behavior.There is a design trade-off involved with such predictors: correlating predictors require little memory for history, which allows them to maintain 2-bit predictors for a large number of individual branches (reducing the probability of branch instructions reusing the same predictor), while local predictors require substan- tially more memory to keep history and are thus limited to tracking a relatively small number of branch instructions. For this exercise, consider a (1,2) correlating predictor that can track four branches (requiring 16 bits) versus a (1,2) local pre- dictor that can track two branches using the same amount of memory. For the fol- lowing branch outcomes, provide each prediction, the table entry used to make the prediction, any updates to the table as a result of the prediction, and the final mis- prediction rate of each predictor. Assume that all branches up to this point have been taken. Initialize each predictor to the following:

Answers

Answer:

a

Explanation:

Easy Question I will make you brainless Just answer this 10 question!!.​

Answers

Answer:

Utility knife - basket

Old newspaper - basket

Strong scissor-Sc

Clean soda can-Sc

Stapler - B

Scissor-basket

Push pin - Sc

Masking tape - Sc

Pin black-Sc

Glue-basket

Can someone check my answers?
I got 4 for c and 17 for d​

Answers

Answer:

both are correct

Explanation:

which email attachments are generally safe to open

Answers

Answer:

i would suggest not opening ones that start with bit . ly

Explanation:

pls mark brainliest

Anything starting in https://

how do spear phishing attacks differ from standard phishing attacks?

Answers

Answer:

Phishing attacks normally target random people on mass amount by sending emails to users. In the other hand the spear phishing only targets 1 person hence the name "spear".

Hope this help please give the brainliest award.

a researcher is interested in assessing risk-taking

Answers

Answer:

Risk-taking is a dangerous behavior

Explanation:

Knowing this he /she should take the proper safety measures

Match the letter with the corresponding Workspace Area

Options :

-workspace settings

-options bar

-menu bar

-toolbar

Answers

The workspace areas described are editing tools of the photoshop program

The options described below are part of the Adobe Photoshop program for image and photo editing.

Workspace settings: It is a bar to configure the general aspects of the workspace in which an image is going to be edited or created.

Options bar: It is a bar located in the upper part (second row) of the document in which we have different options depending on the tool of the toolbar that we choose.

Menu bar: It is the bar located at the top (first row) in which we find different options such as:

FileEditionImageCapTextSelectionFilter3DViewWindowHelp

Toolbar: It is the bar located on the left side of the screen where we find different editing tools for our file, such as:

MoveMagnetic loopTrimDropperBrushDraftDegradedFeather

Note: This question is incomplete because the information is incomplete. However, I can answer based on my previous knowledge.

Learn more in: https://brainly.com/question/24964958

How can we repair a head jack of a laptop charger.????​

Answers

Answer:

Step one turn off the laptop. And take out the battery step two remove the Phillips screw. And then take out the back. Cover. Step three remove four phillips screws. And then take out the hard.

Explanation:

Why would you browse by entering a URL rather than use a link in a Web page

Answers

Answer:

Rather than entering a URL in a web browser, I prefer to browse the webpage. Because if you do browse in the browser you can see other alternative options to that website.

Which options are available in the Conditional Formatting dialog box?

Answers

Answer:

all but b are correct.

Explanation:

Which hacking technique uses network monitoring devices?

Sniffing
Shoulder surfing
Physical security threat
Wire tapping

Answers

Answer:

The answer is sniffing, because sniffing is a process that captures all the data packets, when the network is mentioned.

what is the difference between internal and external css?

Answers

Answer:

Internal CSS are the ones that we can write within the same file i.e the HTML code and CSS code are placed in the same file. External CSS are that we can write in a separate file than the html code i.e the HTML file is separate like(index. ... css).

Explanation:

the superclass javax.servlet.http.httpservlet was not found on the java build path

Answers

Answer:

follow this link https://stackoverflow.com/questions/22756153/the-superclass-javax-servlet-http-httpservlet-was-not-found-on-the-java-build

Explanation:

nice

how many times should the start function be defined in a program?

Answers

Answer:

0 1 2 However many you like

✓ I think its 2x they will start to define the program

what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Answers

Answer:

Image result for what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Common applications of X. 509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID.

Explanation:

what are the differences between a keyboard and a pointing stick.​

Answers

Answer:

keyboard:

A keyboard is for putting information including letters, words and numbers into your computer. You press the individual buttons on the keyboard when you type. The number keys across the top of the keyboard are also found on the right of the keyboard. The letter keys are in the centre of the keyboard.

pointing stick:

A pointing stick is a small joystick used as a pointing device typically mounted centrally in a computer keyboard. Like other pointing devices such as mice, touchpads or trackballs, operating system software translates manipulation of the device into movements of the pointer or cursor on the monitor.

Why is the Game Design Document called a ""living"" document AND why is this important?

Answers

Answer:

documentation

Explanation:

Because it gives the instructions rules and every detail about the game with anything in the real world with computers documentation is extremly important  

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. She can access the network from her usual office, but today, she is trying to access the wireless network from a conference room, which is across the hall and next to the elevator. Which of the following is the MOST likely cause of her connectivity problem?

a. The user has not yet rebooted her laptop computer while at her new location.
b. The user needs a new IP address because she is working on a different floor.
c. The wireless network access point on the user's normal floor has failed.
d. The user is out of the effective range of the wireless access point on her floor.
e. The user has not yet logged off and back on to the network while at her new location.

Answers

Answer:

d. The user is out of the effective range of the wireless access point on her floor.

Explanation:

Convert the denary number 44801 into hexadecimal

Answers

Numbers can be converted between bases.

The equivalent of 44801 in hexadecimal is: AF01

Denary numbers are simply base 10 numbers, while hexadecimal numbers are base 16 numbers

To convert from base 10 to base 16, we make use of division method (and we keep track of the remainders)

We keep dividing by 16, until we can no longer divide the numbers.

So, we have:

[tex]\mathbf{ 44801 \div 16 = 2800\ R\ 1}[/tex]

[tex]\mathbf{ 2800 \div 16 = 175\ R\ 0}[/tex]

[tex]\mathbf{ 175 \div 16 = 10\ R\ 15}[/tex]

[tex]\mathbf{ 10 \div 16 = 0\ R\ 10}[/tex]

Write out the remainders from bottom to top

(10) (15) 0 1

10 in hexadecimal is A15 in hexadecimal is F

So, the number becomes: AF01

Hence, the equivalent of 44801 in hexadecimal is: AF01

Read more about number conversions at:

https://brainly.com/question/2824068

You have a 7 GHz dual core processor. How many decisions can the processor

make in one second? *


PLEASE HELP 10 points

Answers

The unit that you're asking about (GHz) refers to the frequency.
Frequency is the reciprocal of time.
This means that it gives the measure of work done per unit time.
For example, suppose you can throw two apples in one second then the frequency of your throw is 2Hz or 2Hertz.

Automated Deployment is one of the prerequisite for DevOps Implementation.1. True2. False

Answers

True I think………………………..

Automated Deployment is one of the prerequisite for DevOps Implementation is a true statement.

Automated deployment

Automated deployment provides the ability to move your software between testing and production environments by using automated processes.

In other words, it allows organizations to release new features faster and more frequently.

Automated deployment allows faster approach to development, production  and deployment.

learn more on automated deployment: https://brainly.com/question/17052494

#SPJ2

Other Questions
Plz help!!! 50pointssIf give me any random answer I will report you and just get my points back!!!Part A Which statements describe themes developed in Rip Van Winkle? Select the two correct answers. Nature offers a temporary escape from the stresses in life. Time apart can break family bonds. For some, it is easier to avoid conflict than to resist it. The passage of time does not diminish the value of past accomplishments. Question 2 Part B Which details from the story best develop the themes answered in Part A? Select the two correct answers. Rip had but one way of replying to all lectures of the kind, and that, by frequent use, had grown into a habit. He shrugged his shoulders, shook his head, cast up his eyes, but said nothing. Rips daughter took him home to live with her; she had a snug, well-furnished house, and a stout cheery farmer for a husband, whom Rip recollected for one of the urchins that used to climb upon his back. For some time Rip lay musing on this scene, evening was gradually advancing, the mountains began to throw their long blue shadows over the valleys, he saw that it would be dark long before he could reach the village, and he heaved a heavy sigh when he thought of encountering the terrors of Dame Van Winkle. This desolateness overcame all his connubial fearshe called loudly for his wife and childrenthe lonely chambers rung for a moment with his voice, and then all again was silence. HEYYYYYYYYYY PLEASE HELP!!!!! 5. What number is in the ones place of a product of 10 andanother number? Explain. The Goldfish:Write a Narrative from the POV of the Goldfish in "What of this Goldfish would you wish?"Detail the feelings of the emotions of the fish, his opinion of both characters, and what the fishdoes at the end of the story? She speaks so fast that she cannot be followed 1. The --------- in my constituency worry about their financial predicament. Give one example of a question that science could test. Then, explain in your own words why it is an example of a scientific question.ASAP give me something!!!!! 2. Refers to a planned, structured, repetitive, and aims to improve or maintain one or more components of physical fitness A. Physical activity B. Exercises C. Aerobics D. All of the above Which expression is equivalent to , if y 0? 16 teams of hockey are playing. each team plays two matches against another team. how many matches are played Activity 1: rewrite me!1. write the equation 2x+3y=12into y=mx+bSolution 2x+3y=122x + (____) + 3y = 12+(-2x) (____)3y=(-2x+12)(____)y= - x +4Given:Simplified as y= mx+ b2.write the linear equation y= -2x -1 into Ax + By = C.solution y = -2x-1y +(____) = - 2x + (___) - 12x + y = -1Given:Questions:1. how did you write the linear equation y = mx + b to the form Ax + By = C?2. how did you write Ax + By = C?3. what mathematical concepts or principles did you apply to write each linear equation to standard form?to y=mx+b form?brainlest pag Tama ang sagot plus eh fo-follow ko na din.nonesen report Why are most natural monopolies established?O A. To earn maximum profits for shareholdersO B. To increase competition in a struggling industryO C. To help governments provide public servicesO D. To let companies avoid taxes and regulations**Economics** How did the English bill of rights and petition of right influences the American government? Is achieving this goal(30 sit-ups ) realistic with effort and commitment? Have you the resources to achieve this goal(30 sit-ups) ? If not, how will you get them ? PLEASE HELP I'LL MARK BRAINLIST !!!!!!Why are missing forms of cited documentation considered plagiarism? PLEASE HELPPPP!!!! Ugh The graph shows the amount of money paid when purchasing bags of candy at the zoo:What is the constant of proportionality of the image shown below?A. 1/2B. 3/4C. 1D. 2 In mrs. Wilsons math class, the ratio of girls to boys is 5 to 8. If there are 24 total students, how many boys are in the class Earth Atmosfear is uniqe amongst the planets and is able to support life because it contains a large amount of __?A. oxygenB. heliumC. Methane D. Carbon Dioxide Genevieve spent $56.25 to fill her 15-gallon tank. How much did she pay per gallon?A. $3.25B. $3.50C. $3.75D. $4.00