Match the following comparison operators with their symbol:
I. Equal
II. Greater than
III. Less than
IV. Greater than or equal to
V. Less than or equal to
A. >
B. <
C. =
D. <=
E. >=
C, A, B, E, D
You might also like to view...
Designed to lure a potential attacker away from critical systems ____________ are decoy systems that divert an attacker from accessing critical systems, collect information about the hacker's activity, and encourage the attacker to stay on the system long enough for administrators to respond.
Fill in the blank(s) with the appropriate word(s).
List major standardization organizations that create standards for data communications and computer networking.
What will be an ideal response?
Intel is the original ____ chipmaker and still the largest.
A. x86 B. Intel C. clock speed D. Pentium
You can identify the smallest value in a range of cells using the ____________________ function.
Fill in the blank(s) with the appropriate word(s).