1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
beks73 [17]
3 years ago
11

What is binary number

Computers and Technology
1 answer:
lana66690 [7]3 years ago
5 0
Its a number jn the bibary systhem
You might be interested in
Why do networks need standards?
svetoff [14.1K]

Answer:

4. Standards are what guarantee that the different pieces of network are configured to communicate with one another

Explanation:

Networking standards ensure the interoperability of networking technologies by defining the rules of communication among networked devices. Networking standards exist to help ensure products of different vendors are able to work together in a network without risk of incompatibility

Hope it will help you...

3 0
3 years ago
A calculator is not a computer because​
Lady_Fox [76]

\huge\fbox\red{❥answer}

By definition a computer is an electronic device used to store and compute data. So, by definition a calculator stores and interprets data/numbers, and that makes it a computer. However, a computer can also use programs, and manipulate stored data to complete those programs.

hope it helps!! :D

8 0
3 years ago
In the line of code shape ("classic") which part of the code is the argument
Mekhanik [1.2K]
Whatever is in the parenthese
5 0
3 years ago
Read 2 more answers
_________________ component defines the correct granularity for access controls and oversees the relationships between identitie
Otrada [13]

Answer:

<u>Authorization</u> component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.

Explanation:

Access control is a security technique that verifies the permission that a person or device has to enter an area and to what extent. This function is within the identity and access management of a company. Authorization is the definition of what a specific user can do within an application, that is, to what information and operations they have access, in other words, it refers to the management of access to protected resources and the process of determining whether a user is authorized to access a particular resource. Authorization and access control are ways of enforcing access policies. Authorized persons may access certain resources for their job functions and identify and audit the accesses made.

8 0
2 years ago
4. How can a document's organization help us better understand the document's purpose?​
Ad libitum [116K]

Answer:

a document organization can help because it's organized and easy to read on a document.

6 0
2 years ago
Other questions:
  • This technology was developed in the 1980s and was a successful attempt to provide services for voice, video, and video traffic
    11·1 answer
  • Write a program that allows a user to input words at the command line. Your program should stop accepting words when the user en
    10·1 answer
  • Which setting indents all but the first line of a paragraph by the selected length?
    6·1 answer
  • Does the game cooking fever use data?
    10·1 answer
  • 0.005098 megaliters to liters. record your answer in whole liters
    7·1 answer
  • How many pounds must a sand bag weigh to test if a safety net can absorb the proper amount of force? A. 150 lbs. B. 200 lbs. C.
    6·1 answer
  • Write the line of code to calculate the area of a circle with radius 3 and store it in a variable called
    10·1 answer
  • The best presentations try to include as much text as possible on each slide true or false ​
    13·1 answer
  • Determine which system you would recommend each of the customers use based on their provided user and system specs.
    11·1 answer
  • try the following code to see a nullpointer error (if you don’t see the error because of the autograding, you can copy it into t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!