The ____ operator reverses the sign of a number.

A. sign change
B. change
C. sign
D. negation


Answer: D

Computer Science & Information Technology

You might also like to view...

Defense in depth can best be described as which of the following?

A. a firewall that protects the network and the servers B. a layered approach to security C. antivirus software and firewalls D. authentication and encryption

Computer Science & Information Technology

______ is an anonymous form of payment.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An ideal surrogate key is short, alpha-numeric, and never changes

Indicate whether the statement is true or false

Computer Science & Information Technology

____ is an encryption algorithm developed by IBM in the 1970s for the U.S. National Bureau of Standards. PAS RSA DES BES DES

PAS RSA DES BES

Computer Science & Information Technology