1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
3 years ago
11

Which of these statements describes the difference between binary and decimal numbers?

Computers and Technology
2 answers:
ElenaW [278]3 years ago
7 0

Answer:

A

Binary numbers use only the digits 0 and 1; decimal numbers use 0 through 9.

Explanation:

Binary means in couples of two. So you count using 0s and 1s like 01, 10, 11, 100, 101, 110, 111, and so on.

vladimir1956 [14]3 years ago
5 0
The answer is A
Binary numbers use only the digits 0 and 1; decimal numbers use 0 through 9
You might be interested in
Engineers at Edison Laboratories developed a _____ strip that allowed them to capture sequences of images on film.
maxonik [38]

Answer:

Kinetoscope

Explanation:

4 0
3 years ago
Read 2 more answers
Novice drivers lack the experience necessary to reliably categorize and appropriately respond to ___________ hazards.
meriva

Answer:

roadside

Explanation:

Novice drivers lack the experience necessary to reliably categorize and appropriately respond to roadside hazards. A roadside hazard refers to any roadside objects or features that have a diameter greater than 100mm that is on or near the roadway. These are objects or features that are likely to create a dangerous environment to the drivers.

7 0
3 years ago
Your organization has hired a penetration tester to validate the security of your environment. The penetration tester needs to d
yulyashka [42]

Answer:

Port scanner

Explanation:

The penetration tester would most likely use a port scanner. A port scanner can be explained to be an application that is made to check a server or host for ports that are open. This application can also be used by administrators to check their security networks so as to know those network services that are running on a host and also to know existing vulnerabilities. Attackers also use this to exploit victims.

5 0
3 years ago
What are the 5 major components of computer.Give example of each​
notsponge [240]
1-Input unit
2-output unit
3-storage
4-central processing unit
5-arithmetic and logic unit
8 0
3 years ago
En que parte del mall del rio venden tarjetas de google play en cuenca​
JulijaS [17]

chxgfk hcyskvuct auhchovuzq vuvscisv

6 0
3 years ago
Other questions:
  • Which of the following option is correct about HCatalog?
    14·1 answer
  • How important is technology in education? what technology-related skills can you contribute to a school district answers?
    13·1 answer
  • Read the following sentence from an argumentative essay.
    11·1 answer
  • Practice problems on functions. Write C function(s) to carry out the specified tasks. For each problem, also write the suggested
    15·1 answer
  • When parallel parking, you should select a space that is __________ as long as your car.
    11·1 answer
  • Which of the following contributes to your active digital footprint
    12·2 answers
  • To print a budget:________.
    9·1 answer
  • Different between desktop application and web application ?​
    9·1 answer
  • Place the steps in order for creating a Custom Search Folder in Outlook 2016.
    9·2 answers
  • Working with text in presentation programs is very ____ using text in other applications.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!