1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juli2301 [7.4K]
3 years ago
12

What is a binary message

Computers and Technology
2 answers:
noname [10]3 years ago
4 0
Binary SMS messages allow sending of various types of rich-content, such as transfering ringtones, telphone system settings and WAP-Push via text messaging. Any binary SMS message has 140 bytes of data which can be used. This data is split into two distinct parts - the user data header (UDH) and the message data.
avanturin [10]3 years ago
4 0
Binary SMS messages allow sending of various types of rich-content, such as transfering ringtones, telphone system settings and WAP-Push via textmessaging. 
You might be interested in
The matrix theory is used in the ___ technique
wlad13 [49]

Answer:

The matrix theory is used by hill cipher.

Explanation:

Th technique which uses matrix theory is hill cipher technique.

Hill cipher technique is a polygraphic substitution cipher and it is based on linear algebra.

For encrypting a message in Hill Cipher technique each block of n letters is multiplied by an invertible matrix of nxn and that to against modulus 26 and  for the decryption of the message, every block is multiplied by the inverse of the matrix that was used for encryption.

3 0
3 years ago
Suppose I define some structure type ( studentInfo), then I declare an instance of it and I decide to also create a pointer to t
Nookie1986 [14]

Answer:

a. (p*Main).age = 20;

Explanation:

Pointers use ->

where as normal variable use . to access its members

pMain is the pointer.

*pMain is the value inside pMain.

pMain->age = 20;

This statement equals to

(*pMain).age = 20;

Answer is option a.

8 0
3 years ago
At the beginning of a project, what should be the focus?
podryga [215]
The answer is A I think
7 0
3 years ago
On what basis can you categorize the generations of computers?
den301095 [7]
I basically agree with the answer B.
8 0
3 years ago
Helppp me eeeeee eee
gtnhenbr [62]

Answer:

a. taking risks

Explanation:

i hope this helps

3 0
3 years ago
Read 2 more answers
Other questions:
  • How many bits are required to address a 1mx8 main memory if main memory is byte addressable?
    6·1 answer
  • Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet
    11·1 answer
  • How can ascii be used to represent characters in computer system
    7·1 answer
  • Draw a logic circuit for the function F = (A + B)(B + C)(A + C), using NOR gates only. ​
    9·1 answer
  • What is the most recent version of Microsoft Windows?
    12·2 answers
  • Agent Phil Coulson developed this program to register Avengers in S.H.I.E.L.D's database using cutting-edge programming language
    15·1 answer
  • What happens when text is added to grouped objects that is larger than an object ?
    9·2 answers
  • Three reasons why users attach speakers to their computers.
    11·1 answer
  • What is the total number of time zones that can be configured to show by default in a calendar in Outlook 2016?
    13·1 answer
  • Write a python program to check whether the number is divisible by 7. If its divisible, print its divisible otherwise find previ
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!