1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juli2301 [7.4K]
3 years ago
12

What is a binary message

Computers and Technology
2 answers:
noname [10]3 years ago
4 0
Binary SMS messages allow sending of various types of rich-content, such as transfering ringtones, telphone system settings and WAP-Push via text messaging. Any binary SMS message has 140 bytes of data which can be used. This data is split into two distinct parts - the user data header (UDH) and the message data.
avanturin [10]3 years ago
4 0
Binary SMS messages allow sending of various types of rich-content, such as transfering ringtones, telphone system settings and WAP-Push via textmessaging. 
You might be interested in
NAND is logically complete. Use only NAND gates to constructgate-level circuits that compute the
Drupady [299]

Answer:

Hi, for this exercise we have two laws to bear in mind:

Morgan's laws

NOT(А).NOT(В) = NOT(A) + NOT (B)

NOT(A) + NOT (B) = NOT(А).NOT(В)

And the table of the Nand

INPUT OUTPUT

A B A NAND B

0 0         1

0 1         1

1 0         1

1 1         0

Let's start!

a.

Input            OUTPUT

A       A     A NAND A

1         1             0

0        0            1

b.

Input            OUTPUT

A       B     (A NAND B ) NAND (A NAND B )

0         0            0

0         1            0

1          0             0

1          1             1

C.

Input            OUTPUT

A       B     (A NAND A ) NAND (B NAND B )

0        0           0

0        1             1

1         0            1

1          1            1

Explanation:

In the first one, we only need one input in this case A and comparing with the truth table we have the not gate

In the second case, we have to negate the AND an as we know how to build a not, we only have to make a nand in the two inputs (A, B) and the make another nand with that output.

In the third case we have that the OR is A + B and we know in base of the morgan's law that:

A + B = NOT(NOT(А).NOT(В))

So, we have to negate the two inputs and after make nand with the two inputs negated.

I hope it's help you.

3 0
3 years ago
How can we keep technology alive?
kotegsom [21]
"<span>How can we keep technology alive?" It will always stay alive

"</span><span>What is the history of educational technology?" Once The University of Pennsylvania made the first computer

"</span><span>What are the benefits of using technology for teaching and learning?"  It is easier to do homework, turn in homework, do course recovery, and easier to check your grades.

"How will it benefit children in the future?" Same way it does now, and even more.
</span> 
5 0
3 years ago
1. Technician A says you can identify a hybrid vehicle by the badging on the engine cover. Technician B says you can identify a
Liono4ka [1.6K]

Answer:

It's B i did the quiz

and got an 100%

Explanation:

Hope this helps :D

6 0
2 years ago
Which process is based on repulsion of oil and water?
Tasya [4]
E.........................
4 0
3 years ago
Based on the following passage on construction technology during the Middle Ages, why might a worker not be allowed to join a gu
olya-2409 [2.1K]

Answer:

He was not born into a family of skilled laborers

Explanation:

6 0
3 years ago
Other questions:
  • Write a program to help you feed your friends at a party by doing some math about square pizzas. Assume the grader defines a str
    12·1 answer
  • 100 students were asked to fill out a form with three survey questions, as follows: H: Honor Roll C: Club membership (Robotics C
    7·1 answer
  • How does the View tab of the ribbon allow you to look at a document?
    9·1 answer
  • Since cam systems regulate and self-mange the manufacturing process, you classify them as
    9·1 answer
  • Which features of words are used to separate numbers and texts into columns
    11·1 answer
  • Select the correct answer.
    5·1 answer
  • What is the difference between player-centric game design and designer-centric game design? How does a player-centric game assis
    7·1 answer
  • The online underground is used _____. Select 3 options. by law-abiding citizens only on Black Friday for networking by criminal
    11·1 answer
  • How can one create an online professional network using Face book?
    14·1 answer
  • Uhh... What is happening?.. What... Pt 2
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!