1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
2 years ago
8

PLEASE HELP WILL MARK BRAINLIEST

Computers and Technology
2 answers:
Slav-nsk [51]2 years ago
5 0
Boundaries probably but i could be wrong
Sergeeva-Olga [200]2 years ago
3 0
I believe it’s boundaries
You might be interested in
What is the decimal equivalent of 11BA?
allsm [11]

Answer:

To convert hexadecimal number 11BA to decimal, follow these two steps:

Start from one's place in 11BA : multiply ones place with 16^0, tens place with 16^1, hundreds place with 16^2 and so on from right to left

Add all the product we got from step 1 to get the decimal equivalent of 11BA.

Using the above steps, here is the work involved in the solution for converting 11BA to decimal number (Don't forget that we start from ones place to so on...)

Decimal equivalent of "A" = (A) 10 × 16^0 = 10

Decimal equivalent of "B" = (B) 11 × 16^1 = 176

Decimal equivalent of "1" = 1 × 16^2 = 256

Decimal equivalent of "1" = 1 × 16^3 = 4096

Decimal equivalent of "11BA" = 409625617610

11BA = 4538

Here is the final answer, The hexadecimal number 11BA converted to decimal is therefore equal to:

4538

4 0
2 years ago
All of the following are examples of extracurricular activities except:
mart [117]
A, because normally that would be a requirment
8 0
3 years ago
Read 2 more answers
Which is the best description of a computer virus?
MatroZZZ [7]
The best description of a computer virus is. Someone first starts out making a malicious program, then can send it to a unexpected user. After that, when the user opens the malicious program, it can do negative things on the target. The virus first starts out in the system32, then infects a random file type for example, exe files, or dlls etc. Then random errors can pop up on the computer saying "YOUR COMPUTER IS UNDER RISK! CALL THIS NUMBER NOW! 555-555-5555" and the options of the error, can direct you to a website, that can give you another virus. To get rid of a virus, you have to ignore the popups that comes onto your computer, and get a strong antivirus like avast, or avg. Then let it scan the system. After when the scan is done, it will show up the virus, and it will give you options "to delete virus or ignore it" you would hit delete. I hope this answer helped you. Let me know if you have any more questions! Thanks!
6 0
3 years ago
Read 2 more answers
Discuss the purpose of these Windows CLI commands
yanalaym [24]

Answer:

 The window CLI command in the computer is basically stand for the command line interface. The command line interface is basically define as interacting with the various computer programs where the users use the command in the program by using various command lines.

The basic purpose of the CLI commands is that it takes less resources of the computer system. In earlier year of the computing this command used as a standard way for interacting with the computer other than mouse.

The command line interface (CLI) is basically handle the interface of the program. It is also known as command line processor.

7 0
3 years ago
How can you get a fraction bar on a calculatar?
ArbitrLikvidat [17]
Convert a fraction to a decimal value using the fraction to decimal calculator by entering your fraction below. Use the “/” symbol for the fraction bar. To convert a decimal to a fraction, use our decimal to fraction calculator. Check out our fraction to percent calculator to convert fractions to a percentage.
6 0
3 years ago
Other questions:
  • A vertical curve means that any change in the Aggregate Price Level will have what result?
    15·1 answer
  • What will the following program display?
    15·1 answer
  • Who develop punch card​
    7·1 answer
  • How does form get its power natural gas
    14·1 answer
  • Why is weather forecast so important for hang gliders?
    12·1 answer
  • Which of these causes the most collisions?
    14·1 answer
  • Is a NAS just a collection of hard drives or a computer
    10·1 answer
  • An example of computer hardware is ? A. keyboard B. app C. web browser D. operating system
    13·2 answers
  • The User Datagram Protocol (UDP) is called the connectionless protocol because: It does not attempt to fix bad packets but resen
    8·1 answer
  • An IT security threat is anything that might cause serious harm to a computer system.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!