1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anon25 [30]
2 years ago
10

What do computers use to represent on and off? 0 and 1 1 and 2 RGB Megabyte

Computers and Technology
1 answer:
rosijanka [135]2 years ago
7 0
We use 0 to represent "off" and 1 to represent "on". Each one of the switches is a bit. A computer is called a "64-bit" computer if its registers are 64-bits long (loosely speaking). Eight switches in a row is a byte.
You might be interested in
In the language of the World Wide Web, "this page cannot be displayed" means A. your computer's software is damaged. B. the ISP
asambeis [7]
The answer is d. most definitely <span />
7 0
3 years ago
Read 2 more answers
What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and
Vladimir [108]

Answer:

The specific type of tools that can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security issues are:

1. Arachni

2. Grabber

3. Iron wasp

4. Nogotofail

5. SonarQube

6. SQLMap

7. W3af

8. Wapiti

9. Wfuzz

10. ZedAttack Proxy Zap

Explanation:

The testing tool is capable of uncovering a number of vulnerabilities, to scan small web applications, to uncover over 25 types of web application vulnerabilities, to detect TLS/SSL vulnerabilities and misconfigurations, to measure the source code quality of a web application, to detect and utilize SQL injection vulnerability in a website’s database, to find over 200 types of security issues in web applications, to check web applications for security vulnerabilities.

The security testing tool supports command-line access for advanced users can also be used to intercept a proxy for manually testing a webpage.

5 0
3 years ago
4.2 lesson practice help plzs
sertanlavr [38]

The output is 21 because c is incremented by 3 until it surpasses 10 and the value of c is added to sum each time the loop runs.

I hope this helps!

8 0
2 years ago
Technician A says that a system should be recharged with refrigerant until the condenser temperature is equal to the ambient tem
Reptile [31]

Answer:

Technician B

Explanation:

The vehicle will always come with a sticker placed under the hood of the AC unit. This sticker has information like the amount of ounces or pounds required for a complete charge. The car’s gauge will state the psi with most gauges having a color bar on the face the appropriate pressure.

6 0
3 years ago
Explain how the use of Git and a shared public Git repository simplifies the process of managing opensource development when man
GrogVix [38]

Answer:

Git is a collaborative software used by members of a group to share and work on the same projects. Github is a web application that uses git to link people working together on a codebase. With git and Github, opensource projects can be accessed and collaborated on by volunteers.

Explanation:

Opensource development is a collaborative group of developers working together on a software or platform with a general public license. When working on an opensource project, each developer is able to folk or get a copy of the repository downloaded to a local computer which they can work on and push or update to the actual online repository if the condition for a change is met.

4 0
3 years ago
Other questions:
  • After doing the route tracing to a particular IP addresses, paste the path of IP addresses that were taken from your IP address
    13·1 answer
  • How must you rect to a flashing<br> Yellow traffic light?
    9·1 answer
  • Windows explorer has a pane located on the left side which can display the directory structure of one or more drives. what is th
    15·1 answer
  • Which practice represents the trait of effective communication?
    6·2 answers
  • You are a network security administrator for a bank and you have noticed that an attacker has exploited a flaw in OpenSSL and fo
    9·1 answer
  • Where can you place CSS statements in an HTML file?
    7·1 answer
  • What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
    9·1 answer
  • Information about hardware engineers?
    9·1 answer
  • Npesta kenos reaction
    13·2 answers
  • Simple example of hybrid computer​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!