1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
torisob [31]
3 years ago
15

Digital information is stored using a series of ones and zeros. Computers are digital machines because they can only read inform

ation as on or off –1 or 0. This method of computation is known as the ____________ system
Computers and Technology
1 answer:
Elan Coil [88]3 years ago
4 0
This is the binary system. Numbers are easily translated from binary simply by each binary number in a bit of information has an exponential value. You can translate binary to words because each set of 8 0s and 1s can be translated into numbers which are labeled in a system called asscii. For each number there is a charecter or symbol associated. for example:0000 0011 would translate to 3 and in asscii that 3 would translate into a G. therefore 00000011 would be translated twice by the computer if you hit the g key on your keyboard until a G was displayed on your screen.
You might be interested in
Su now wants to highlight several inventors in her presentation, so she decides to use the underline color option.
Mars2501 [29]

Answer:

1. The home tab

2. Font group

3. The small arrow at the bottom right of the font command group.

4. On "Font" heading (then "All text" subheading)

Explanation:

The following explanation will help Su in accomplishing her task.

1. Go to the home tab;

2. From the home tab, Su will have access to various command groups but in her case, she needs the Font command group.

3. There's a small arrow located at the bottom left of the font command group section; clicking on this arrow will open the font dialogue.

4. On the font dialogue, there are two headings. The "font" heading and the "character spacing" heading.

In her case, she needs the "Font" heading. The font heading also has various subheadings. To access the underline colour option, she needs the "All text" subheading.

See attachment for picture guide.

7 0
3 years ago
A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer’s technical suppo
dlinn [17]

Answer:

The answer is "The user uses the method for retrieval, which is dependent on the specific app or devices on the operating system".

Explanation:

For retrieving the requested information of the form, with the user device, he uses the retrieval method, which is based upon the specific application or system operating system.

  • In this, the user can resolve the mobile phone application but also show the errors which have been committed to the assistance team of the application manufacturer.
  • Its repair technician requires detailed system data on the way the software responds and also what triggers the mistakes.
4 0
3 years ago
In order for your laptop to make a wireless connection, it must first find an available __________ to connect to.
Nitella [24]
The answer is Service Set Identifier or SSID.

Every wireless router sends out a beacon signal to allow other devices such as laptops, wifi printers, personal cellphones when set to look for and connect to the routers SSID. This SSID can also be shut off or hidden from public domains so not every person stopping by can try to connect to the router via the SSID. Usually you must have a password to follow an attempt to connect to the exact wireless router.
3 0
3 years ago
Rebecca is creating a method for her class, but wants to make sure that a variable in the method satisfies a conditional phrase.
astraxan [27]

Answer:

D. an assertion

From PLATO

6 0
2 years ago
In other programming languages, the dictionary data structure is referred to as a(an)
hjlf

Answer:

hash

Explanation:

it is called a <u>hash,</u><u> </u><u>a </u><u>map</u><u>,</u><u> </u><u>or </u><u>a </u><u>hasmap</u>

5 0
2 years ago
Read 2 more answers
Other questions:
  • Evidence that Social media hasn’t improved human communication.
    12·1 answer
  • 30
    5·1 answer
  • Whenever Jim starts his laptop, he sees some commands and numbers appearing on his screen. These instructions are being processe
    12·2 answers
  • Containers for contaminated sharps must have several characteristics. What’s missing from the list? PuContainers for contaminate
    5·2 answers
  • What is the best overall approach to education and career development for IT professionals?
    14·2 answers
  • Intellectual ______ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software.
    13·2 answers
  • The quicksort pivot value should be the key value of an actual data item; this item is called the pivot. True or False?
    11·1 answer
  • String[][] arr = {{"Hello,", "Hi,", "Hey,"}, {"it's", "it is", "it really is"}, {"nice", "great", "a pleasure"},
    11·1 answer
  • How many total bits are required for a direct-mapped cache with 128 blocks and a block size of 8 bytes, assuming a 4GB main memo
    15·1 answer
  • 1. Separate valid and invalid variables:
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!