The * key is used for _____.

Answers

Answer 1
Answer:

The asterisk key or * key which is on above the number 8 on the computer keyboard is used to represent and perform the multiplication operations.

What is the use of * key?

Star key is represented with (*) symbol and used to perform the multiplication operations in a computer. The functions of this can be changed with different software.

The * key is generally known as the asterisk. It is found above the number 8 on a computer keyboard, and pressing the number 8 with shift is used to create this key.

Hence, the asterisk key or * key which is on above the number 8 on computer keyboard is used to represent and perform the multiplication operations.

Learn more about the keyboard key here:

brainly.com/question/14376228

#SPJ1

Answer 2
Answer:

Answer:

Explanation:

it is B: multiplication

I am 100% sure it is correct


Related Questions

It means fruit- trees garden.
An ecommerce ____________ is the software that handles ecommerce transactions.​
E-mail played a role in political upheavals in Europe because it became an important means of communication in Europe. E-mail, commonly used by governments, businesses, and private individuals in regions with advanced technology, how was it transmitted?
How will a decrease in technology from a natural disaster such as a hurricane, ceteris paribus, affect an economy's production possibilities curve?
Which button is used to open the Start menu in Windows Vista?a. Organize b. Windows icon c. Control Panel d. Views

Declare and initialize the following variables: monthOfYear, initialized to the value 11 companyRevenue, initialized to the value 5666777 firstClassTicketPrice, initialized to the value 6000 totalPopulation, initialized to the value 1222333

Answers

Answer:

int monthOfYear=11;

long companyRevenue=5666777;

int firstClassTicketPrice=6000;

long totalPopulation=1222333;

Explanation:

Here we have declared four variable   monthOfYear ,  companyRevenue,   firstClassTicketPrice ,  totalPopulation as int ,long, int and long type .We have declared companyRevenue,totalPopulation as long type because it exceed the range of integer.

Following are the program in c language

#include <stdio.h> // header file

int main() // main function

{

int monthOfYear=11; // variable

long companyRevenue=5666777; //variable

int firstClassTicketPrice=6000;//variable

long totalPopulation=1222333;//variable

printf("%d\n%ld\n%d\n%ld",monthOfYear,companyRevenue,firstClassTicketPrice,totalPopulation); // display value

   return 0;

}

Output:

11

5666777

6000

1222333

Advantages and disadvantages of social media

Answers

The advantage of using social media is connecting people together. It also leads to an open communication to enhance fast delivery of information. Allowing to discuss ideas, news, and ask questions. It also has the opportunity widen your contacts especially in business.
For the disadvantage, it opens possibility for hackers to launch virus attacks and commit fraud. It also increase the risk to online scams.

Answer:

Advantages and Disadvantages of social media  is discussed below.

Explanation:

Advantages and disadvantages of social networking

  • Advantages of Social Networking Sites. Networking externally boundaries, Instant News and Information, Excellent retailing course for Business, Consciousness and Activism, Exchange of opinions and Collaboration.
  • Disadvantages of Social Networking Sites. Obsession, Mental Illness, Cheats & Scams, Misleading Knowledge, Cyberbullying, Hacking.

Which precautions should you follow to prevent an abrasive wheel from cracking? a. all of the answers are correct
b. fit the wheel on the spindle
c. make sure the spindle speed does not exceed the maximum speed marked on the wheel
d. tighten the spindle nut enough to hold the wheel in place without distorting the flange

Answers

I'd say that the precautions that you should follow to prevent an abrasive wheel from cracking is A. all of the answers are correct: fit the wheel on the spindle, make sure the spindle speed does not exceed the maximum speed marked on the wheel, and tighten the spindle nut enough to hold the wheel in place without distorting the flange.

Why would a team choose to employ a zone defense over a person to person defense?

Answers

Answer/Explanation:

Zone defense is chosen if MULTIPLE people are attacking one spot that's why they would choose zone defense.

Person to person defense is when 1 person is attacking one spot so somebodies sent out to defend it.

~ LadyBrain

6. when a program is finished using a file, it should do this. a. erase the file b. close the file c. throw an exception d. reset the read position 17. this class allows you to use the print and println methods to write data to a file. a. file b. filereader c. outputfile d. printwriter 18. this class allows you to read a line from a file. a. filewriter b. scanner c. inputfile d. filereader 19. true or false: the while loop is a pretest loop. 20. true or false: the do-while loop is a pretest loop. 21. true or false: the for loop is a posttest loop. 22. true or false: it is not necessary to initialize accumulator variables. 23. true or false: one limitation of the for loop is that only one variable may be initialized in the initialization expression. 24. true or false: a variable may be defined in the initialization expression of the for loop. 25. true or false: in a nested loop, the inner loop goes through all of its iterations for every iteration of the outer loop. 26. true or false: to calculate the total number of iterations of a nested loop, add the number of iterations of all the loops.

Answers

Answer:

16. close the file

17. Output file

18. scanner

19. true

20. false

21. false

22. false

23. false

24. true

25. true

26. false

Explanation:

Hope it helps!

What term describes a set of software tools designed to increase the privileges of a user or to grant access to the user to portions of the operating system that should not normally be allowed?

Answers

Answer:

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.The term rootkit is a concatenation of "root" (the traditional name of the privileged account on Unix-like operating systems) and the word "kit" (which refers to the software components that implement the tool).