1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trapecia [35]
3 years ago
7

Binary code what does this mean I was sick so I don't under stand

Computers and Technology
2 answers:
Sergio [31]3 years ago
5 0
Check out:  https://www.mathsisfun.com/binary-number-system.html to learn binary, this to convert binary to hexadecimal (it'll make looking up the ASCII values easier): http://www.wikihow.com/Convert-Binary-to-Hexadecimal and
http://www.asciitable.com/ for the ASCII values.


Leni [432]3 years ago
4 0
Using binary digits 0 and 1 to represent a letter, digit, or other character in a computer or other electronic devices
You might be interested in
I need the answer ASAP. I’ll mark brainliest if right
Kisachek [45]

Answer:

copy or repeat

Explanation:

7 0
2 years ago
A friend complains that she is always running out of money even though she “never buys anything expensive.” What advice would yo
Paraphin [41]
To not buy anything unless it is 100% necessary.
4 0
3 years ago
Read 2 more answers
Why should information technology NOT be taught in school?​
tatiyna

Explanation:

Technology should not be used to teach in school as it can lead to distractions. With kids wanting to explore other sights, cheating, and communicating with others. Also, it can be expensive to purchase the technology for everyone as it can be a major investment with hundreds or thousands going into it. Technology also requires a lot of training by having to adapt lessons compatible with the systems and making sure the software is secure.

5 0
3 years ago
Which of the following is a technique for storing or copying log events to acentralized logging server?a. Syslogb. Write­once re
Neporo4naja [7]

Answer:A) Syslog

Explanation: Syslog is the log for the messaging in the computing field.It acts as a separator for the different task that is related to messaging. The task usually are storing of message, production of the message through software,analyzing message, reporting it etc.

Other options given in the question such as WORM storage is for the storage technology,UTM is for the management for the threat situation and firewall logging is related with log/tables for firewall.

Thus, the correct option is option (A).

5 0
3 years ago
What type of culture is computer hardware?
skad [1K]
Culture, the software, is learned to trigger evolution to a new type of society, they may all.
6 0
2 years ago
Read 2 more answers
Other questions:
  • If using the md5 hashing algorithm, what is the length to which each message is padded?
    11·1 answer
  • How can I collect tweets from different accounts concurrently and categorize the tweets in a corpus?
    15·1 answer
  • What is the nickname given to the new generation that was raised entirely within the digital age and often communicates through
    7·2 answers
  • Which of the following is true of operations within a spreadsheet program’s built-in functions?
    15·2 answers
  • Who is the first British in Europe ​
    10·1 answer
  • क) मानौं तिमी बसेको समाजमा मान्छेहरूले सधै फोहर फाल्ने गर्नाले वातावरण प्रदूषित
    13·1 answer
  • Which one of the statements best characterizes the current state of e-commerce?
    15·1 answer
  • b. Write a complete program for the following situation related to setting the speed of a car to preset values before starting a
    5·1 answer
  • What can handle work that is hard on a person and could cause repetitive injuries?
    6·1 answer
  • What are the local, state, and national opportunities that may be available to those who participate in CTSOs?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!