1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mihalych1998 [28]
3 years ago
11

52.

Computers and Technology
1 answer:
OLEGan [10]3 years ago
7 0
For the first one its NOW, I'm not sure about the 2nd, the 3rd I think is penal code cases but i could be wrong, and the 4th one sounds like voting is the most logical answer. 
You might be interested in
What would you enter at the command prompt on a Linux system to display the IP addressesand the subnet masks assigned to each ne
noname [10]

Answer:

The ifconfig command.

Explanation:

A linux network system, like cisco networking devices, uses the linux operating system, in which it configuration differs from that of the cisco. It is very essential in network administration of have the basics in linux systems.

The network administrator uses the "ifconfig" command to display the IP addresses and subnet masks assigned to each network interface on a linux system.

5 0
3 years ago
PLEASE HELP ITS CODING AND I INCLUDED A SCREENSHOT OF WHAT TO DO
madam [21]

Answer:

I need to have better photos in order to assist you...

Explanation:

I will attempt to get back with you if you can provide more clearer photos.

6 0
3 years ago
Read 2 more answers
Why are various creative works split up into different types under copyright law?
noname [10]

Answer:

I want brainliest plz!!!

Explanation:

There are two ways that derivative rights are protected under copyright law. First, the derivative work has protection under the copyright of the original work. Copyright protection for the owner of the original copyright extends to derivative works. ... Second, the derivative work itself has copyright protection.

6 0
2 years ago
I WILL MARK YOUR BRAINLIEST IF YOU ANSWER
anyanavicka [17]

Answer:

Explanation:

Sorry it's very messy, for this a loop is need but inclusive of a count/index variable which I have used and called the variable 'number'

4 0
3 years ago
An encryption system works by shifting the binary value for a letter one place to the left. "A" then becomes: 1 1 0 0 0 0 1 0 Th
Vika [28.1K]

Answer:

The hexadecimal equivalent of the encrypted A is C2

Explanation:

Given

Encrypted binary digit of A = 11000010

Required

Hexadecimal equivalent of the encrypted binary digit.

We start by grouping 11000010 in 4 bits

This is as follows;

1100 0010

The we write down the hexadecimal equivalent of each groupings

1100 is equivalent to 12 in hexadecimal

So, 1100 = 12 = C

0010 is represented by 2 in hexadecimal

So, 0010 = 2

Writing this result together; this gives

1100 0010 = C2

Going through the conversion process;

A is first converted to binary digits by shifting a point to the left

A => 11000010

11000010 is then converted to hexadecimal

11000010 = C2

Conclusively, the hexadecimal equivalent of the encrypted A is C2

8 0
3 years ago
Other questions:
  • You just turned on a four port Ethernet switch (it hasn’t learned any addresses yet) and connected a host to each port. You send
    8·1 answer
  • How can i do a back up on one computer and save it to the hard drive in another computer without it being seen by others on the
    9·1 answer
  • MIDI is a A.technology based on placing brief digital recordings of live sounds under the control of a synthesizer keyboard. B.t
    10·1 answer
  • How can you create an illusion of spatial depth in a two-dimensional design?
    15·1 answer
  • Which of the following tools and techniques shows theimpacts of one decision over another as well as the probability andcost of
    15·1 answer
  • Thomas owns a small Web services company and currently owns and maintains all his own computing hardware. He plans to develop an
    14·1 answer
  • Why does every image on brainly look like this too me?? it started today
    15·2 answers
  • Each pixel includes 3 colors; Red, Green and Blue. Each color uses 8 bits to store it's intensity. How many Bytes are needed for
    12·1 answer
  • A major public university graduates approximately 10,000 students per year, and its development office has decided to build a We
    10·1 answer
  • Question 1 (1 point)
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!