1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frosja888 [35]
3 years ago
13

Please decode 01101101 01101111 01101110 01110100 01101000 01101100 01111001

Computers and Technology
1 answer:
Natalija [7]3 years ago
6 0
I think that says monthly. (i used a translator. which should be correct.)
You might be interested in
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
Brilliant_brown [7]

Answer:

True.

Explanation:

An investigator would like to do an internet-based college student survey to gather data regarding their behavior as well as drug use. Even so, specific identifications are still not gathered and IP addresses might be available in the set of data. Damage threat must be assessed both by the magnitude (or severity) and the likelihood (or likelihood) of the hurt.

7 0
4 years ago
How can IT infrastructure be linked to the business strategy of any organization
Anni [7]

Answer:

The overview of the situation is discussed in the following part.

Explanation:

It's indeed real that perhaps IT technology will have a strategic edge and improved market efficiency. IT technology can improve the protection, accessibility, and efficiency of any enterprise.

Numerous massive, small as well as medium-sized companies or beginning are currently preparing their growth plans by sustaining a stable IT infrastructure throughout the place that will ensure and increase their profitability.

<u>Those same years, the accompanying IT infrastructure is being used to connect the market strategy</u>:

  • Broadband and Wireless Connectivity,
  • Security and Risk Management,
  • IT Structure Strategy,
  • Performance Strategy, etc.
7 0
3 years ago
Anyone play Ps4 and wanna run up some warzone or Gta? Im M 16 so dont be a creep... :) ill mark brainliest if you drop gamertag
Nikitich [7]

Answer:

Xbox/ PC game here

Explanation:

4 0
3 years ago
Read 2 more answers
Given the following code fragment, what is the data type of roster[9] .name? struct student { string name; double gpa; }; studen
SVETLANKA909090 [29]

roster[50] is an array of "students", so roster[9] is a "student". Therefore, roster[9].name is a string.

3 0
3 years ago
Write a short-essay discussing your own stand on social media usage for students.​
hjlf

Answer:

More than half of the world’s population uses the internet. This is highlighted by social media users increasing by 21% since 2015, with 2.8 billion users reported globally in 2017.

Humans are social animals. We always like to remain in some group or another, and we prefer to follow what this group does. All of our traditions and cultures are the product of <em><u>this</u></em> group-oriented facet of human nature.Everyone is connected to one another in this vast network generated by the Internet.It illuminates the lives of thousands of people by spreading knowledge internationally, thereby making us global citizens. 

<h2><em><u>NOT</u></em><em><u> </u></em><em><u>COPIED</u></em><em><u> </u></em><em><u>ANSWER</u></em><em><u> </u></em></h2>
3 0
3 years ago
Other questions:
  • Pix blocks półfinały skilled
    7·1 answer
  • IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally,
    11·1 answer
  • What kind of security features does Microsoft Security Analyzer promise?
    5·1 answer
  • .in the array based list implementation of the ADT what is the worst case time efficiency of the remove method?
    6·1 answer
  • What is the term used to describe a computer system that can store literary documents, link them according to logical relationsh
    5·1 answer
  • Where do you define parameter variables?
    14·1 answer
  • You can insert video by clicking video drop-down menu on the ______ tab.
    15·1 answer
  • Complete the sentence.
    8·1 answer
  • Select the three concepts of capital outlay.
    15·1 answer
  • a cloud access security broker (casb) provides protection across 4 areas/pillars: visibility to detect all cloud services, data
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!