1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinvika [58]
3 years ago
9

PLEASE I NEED HELP WITH THIS I WILL GIVE BRAINLIST!!!!!

Computers and Technology
2 answers:
Neko [114]3 years ago
8 0
It would be so you like chocolate because there is only two options. Yes or no
Mrrafil [7]3 years ago
6 0

Your answer is Do you like chocolate.  Because a Binary Question is a question that has true/false or yes/no answers.

Hope this helps

You might be interested in
Fill in the sentences with the correct terms.
ololo11 [35]
<h2>[+] Hello ! [+]</h2>

Answer:

<em>Cells provide data to another cell. </em>

<em>Cells rely on the value of another cell. </em>

Explanation:

  • I hope this helped
  • Tell me if it's wrong
  • Thanks for your time
  • Brainliest is always appreciated!!
  • Have a wonderful and blessed day :D
5 0
3 years ago
Read 2 more answers
Guidelines on how to write a report on how technology has affected office duties
UNO [17]

Answer:

weweweweweewewwewweewewweeew

Explanation:

weweweweewweweweewweewweewewew

5 0
3 years ago
A firewall can consist of all devices positioned on the network _____________.
ale4655 [162]

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

6 0
4 years ago
How is cropping different from scaling?​
Keith_Richards [23]

Answer:

Scaling changes the size of the whole image by resampling it(duplicating the pixels). in cropping you only get a part of the original image/ remove the outer area of it .

Explanation:

8 0
3 years ago
Answer the following questions:
Alika [10]

Answer:

nasaan po yung tanongkkkkk

8 0
3 years ago
Other questions:
  • The network board in a workstation is currently configured as follows:- network speed = auto- duplexing = autoThe workstation is
    13·2 answers
  • In the 21st century organization we will see:
    10·1 answer
  • Java
    13·1 answer
  • Sam wants to move from his current role in his organization to a managerial role. Which certification will help him get on a man
    6·1 answer
  • Bloodborne pathogens travel by way of blood cells and can only be spread by person-to-person contact with infected blood
    5·2 answers
  • A network technician has created a network consisting of an external internet connection, a DMZ,
    14·1 answer
  • Select the characteristics that describe the evolution of computers that predate the personal computer (select all correct answe
    12·1 answer
  • A major retailer wants to enhance their customer experience and reduce losses
    9·1 answer
  • What is wrong with line 3 ?
    11·1 answer
  • Why isn't image display working on wacom tablet.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!