1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
1 year ago
13

What is the number base of the binary number system?

Computers and Technology
1 answer:
Margarita [4]1 year ago
4 0

Answer:

2

Explanation:

The system only uses 2 numbers which are 0 and 1 instead of the usual 10 numbers; 0, 1, 2, 3, 4, 5, 6, 7, 8 & 9.

You might be interested in
2. As a student (now or in college) name a way you can use Excel. How can that help you as a student?
Scilla [17]

Answer:

The more you try some simple Excel tips and tricks, the more comfortable you’ll be using advanced Excel tricks moving forward. In addition to helping you in college, these Excel tips and tricks can help you secure and retain a job after you graduate. In 2013, IDC published a white paper which was originally commissioned by Microsoft Corporation.

Explanation:

8 0
3 years ago
What do you do to think positive and maintain discipline to play
Agata [3.3K]

Answer:

to make peaceful mind.to develop our character..

6 0
3 years ago
Ken is a table busser at a restaurant. Ken's boss has requested that instead of waiting to be told what tables need to be cleane
Vsevolod [243]
Ken can improve his initiative
5 0
3 years ago
Read 2 more answers
Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender
Pavlova-9 [17]

Answer:

C. Spoofing.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.

Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.

4 0
3 years ago
When you reboot your system, the computer takes instructions to start from the?
just olya [345]
It is either BIOS or ROM
7 0
4 years ago
Other questions:
  • A computer is a multipurpose device that accepts input processes data and produces output all according to a series of stored
    8·1 answer
  • If you were going to construct a table that only included shape names with number prefixes, which shape would you include
    11·1 answer
  • Kelvin owns a small trading firm. Recently, he suspected that some of his employees were using fraudulent activities for their p
    5·2 answers
  • With _______, applications are owned, delivered and managed remotely by one or more providers over the Internet or an intranet,
    15·1 answer
  • Create the logic for a program that prompts a user for 12 numbers and stores them in an array. Pass the array to a method that r
    8·1 answer
  • Where are methods listed in a UML class diagram showing three parts?
    8·1 answer
  • True false.
    10·2 answers
  • An if statement must always begin with the word “if.” True False python
    15·2 answers
  • Is social media bringing people together or cause in sepretation?​
    11·2 answers
  • Use the following flowchart to implement a simple application that will help students decide whether computer science is a good
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!