1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sammy [17]
4 years ago
8

Why do we need the binary system?

Computers and Technology
1 answer:
nika2105 [10]4 years ago
6 0

Answer:

We need to have binary numbers because that is how computers process data.

Explanation:

You might be interested in
Following rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as _______.
vampirchik [111]

In regards to the rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as 2001:db8::ff00:12:3456.

<h3>What is IPv6?</h3>

The IPv6 address is known to be a form of Internet Layer protocol made for packet-switched internetworking and it helps to give  an end-to-end datagram movement in course of multiple IP networks.

Note that, In regards to the rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as 2001:db8::ff00:12:3456.

Learn more aboutIPv6 address   from

brainly.com/question/5296366

#SPJ1

4 0
2 years ago
You have been asked to configure a client-side virtualization solution with three guest oss. Each one needs internet access. How
ArbitrLikvidat [17]

The most cost-effective way to configure a client-side virtualization solution is by using one (1) physical NIC, three (3) virtual NICs, and one (1) virtual switch.

<h3>What is virtualization?</h3>

Virtualization refers to the creation of an abstraction layer over computer hardware through the use of a software, in order to enable the operating system (OS), storage device, server, etc., to be used by end users.

In this scenario, the most cost-effective way to configure a client-side virtualization solution is by using one (1) physical network interface card (NIC), three (3) virtual network interface cards (NICs), and one (1) virtual switch.

Read more on virtualization here: brainly.com/question/14229248

#SPJ1

4 0
2 years ago
Each high-level language has its own __________, or rules of the language. group of answer choices
il63 [147K]

Each high-level language has its own syntax which is also called rules of the programming language. Therefore, the correct choice is syntax.

High-level languages have a greater level of abstraction from details of the computer. They focus more on the programming logic which is closely associated with human understanding instead of the underlying hardware modules. Each high-level programming language has its own specific set of rules which is known as the syntax of that language.

Syntax of the high-level languages define structure and formation of the statements in the language. In order to write a program in any high-level programming language, proper syntax of that programming language requires to be followed.

If the syntax of the programming language is not followed properly, the compiler will produce errors. In result, required output of the program will not be generated because of the failure of the program execution.

You can learn more about syntax at

brainly.com/question/831003

#SPJ4

5 0
2 years ago
Which infection sends information to your computer through a third party
Daniel [21]

Answer: Spyware

Explanation:

Spyware is a blanket term given to software that gathers information about your computer and the things you do on it, and sends that information over the Internet to a third party

8 0
3 years ago
Read 2 more answers
This keeps appearing at random times. I am on iOS 12 beta, and it keeps showing. I want to download the official release, but I
Kamila [148]

This article should tell you what to do! https://appleinsider.com/articles/18/08/30/apparent-ios-12-beta-bug-causes-never-ending-notifications-to-update-software

8 0
3 years ago
Other questions:
  • Suppose there is a class Roster. Roster has one variable, roster, which is a List of tuples containing the names of students and
    6·1 answer
  • A series of inventions led to the creation of the electronic digital computer shortly after this war..
    12·1 answer
  • Certain medications can increase risk of obtaining a sunburn true or false
    12·1 answer
  • Women make up 52 percent of the voting-age population and are more likely to vote, yet
    12·2 answers
  • The first thing you must consider in any type of communication is ______.
    9·2 answers
  • Explain how software is distinct from hardware.
    8·2 answers
  • The engine flywheel bolts to the Rotor Pistons Front axle Crankshaft
    13·1 answer
  • Where do players resurrect if they have been destroyed in a game?
    13·1 answer
  • In dos operating system ,write a command to delete the directory as well as the files of the directory ''world'' on drive E.
    15·1 answer
  • What relationship do MP3s and MP3 players have with video files?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!