1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
4 years ago
7

What is a binary digit

Computers and Technology
1 answer:
uranmaximum [27]4 years ago
4 0
One of two digits (0 or 1) in a binary system of notation.
(i looked it up)
You might be interested in
In what type of attack does the attacker send unauthorized commands directly to a database?
Delvig [45]
SQL injection. This is usually cause by the programmer not making the program parse incoming text, therefore allowing an attacker to input database commands.
4 0
4 years ago
In response to a recent outbreak of computer viruses, Babbage Industries, a large technology company, installs computer virus pr
Vinil7 [7]

Answer:

The answer is antivirus solution implementation and planning.

Explanation:

Enterprises use antivirus implementation to protect from threats of different types such as Trojan horses, rootkits, ransomware, spyware, and botnets. Withing organizations, this implementation requires a proper planning and implementation plan that helps companies to protect the enterprise system. So, antivirus implementation and planning is the answer.

8 0
3 years ago
Read 2 more answers
Which type of document should Omar print?
Zinaida [17]

Well it depends on the topic he is doing. if it is a list then a plain doc with a list of numbers. if he is writing a letter then he should use the letter template.

7 0
3 years ago
Read 2 more answers
Sub to the channel plz plz
Hunter-Best [27]

Answer:

um

Explanation:

6 0
3 years ago
Read 2 more answers
What are an administrator's choices for managing file permissions on a drive formatted as fat32?
Alexeev081 [22]
<span>If the drive is a network share, then Share permissions can be used.</span>
6 0
4 years ago
Other questions:
  • Which of the following best describes the protocols used on the Internet?
    9·1 answer
  • Which hypervisor works on older pcs without hardware virtualization support?
    9·2 answers
  • To what type of user does he most likely have access? Jae is using a computer at the public library to do research she's able to
    9·1 answer
  • BRALYEST TO FIRST PERSON THAT IS CORRECT!!! Select the correct navigational path to add titles to your printable worksheet. Clic
    9·2 answers
  • 1. Give one reason why data is represented in binary in a computer
    15·1 answer
  • When using the Simple Query Wizard, Kirsten wanted to transfer all of her available data to a new table. She should click
    14·1 answer
  • Python exercise grade 10
    7·1 answer
  • Who has gotten a random file link from someone? What file does it contain?
    8·2 answers
  • List out various computer generation long with their basic characteristic ​
    13·1 answer
  • Please help!
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!