1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VLD [36.1K]
4 years ago
14

Before a computer can store a real number in memory, it must be encoded in __________.

Computers and Technology
1 answer:
kiruha [24]4 years ago
5 0
Binary. It uses 2s complement to determine the binary representation.
You might be interested in
Charlie makes pizza at a restaurant. The customers always compliment how great the pizza tastes. But Charlie takes a long time t
Oksi-84 [34.3K]
To get this u must do 8372928+(2728279298)=382627-6382638)()()(7372637 I did it right I’m the test
8 0
3 years ago
Read 2 more answers
Write its features:features of computer ​
Digiron [165]

Answer:

There are different characteristics of a computer is the following below.

Speed.

Accuracy.

Diligence.

Reliability.

Versatility.

Storage Capacity.

Automatic.

Quick Decision.

Explanation:

Sorse  

System https://quicklearncomputer.com

Mark brainlist if you want ¯\_(ツ)_/¯

5 0
3 years ago
What describes the time it takes a packet to move from one designated on the network to
lana66690 [7]

Answer:Latency

Explanation:Latency is the measurement that describes about the (RTT)round trip time of a packet. RTT consist of the function of the packet travelling from the source to destination and then back again to the source port. If there is any kind of disturbance in the path of transmission then it causes the loss in the data packet.Therefore, the correct option is latency.

5 0
3 years ago
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
Which software development team memeber is responsible for the timeline and budget
Sliva [168]

Answer:

The Project Manager

Explanation:

This person's job is to manage the project budget and map out how much time would be spent on each phase. Also his/her job is to ensure that all deliverables and on time.

7 0
3 years ago
Other questions:
  • propose,two new ,proudly South African ways,which you can visualize that the IoT,can be used at work to make life better.
    12·1 answer
  • An enterprise DBMS is automatically capable of serving as a mobile DBMS. There are no special issues raised by mobility. True Fa
    11·1 answer
  • Subnetting is accomplished by borrowing bits from the _____ portion of an ip address and reassigning those bits for use as netwo
    13·1 answer
  • What does artifishal inteligence mean
    5·2 answers
  • How many address bits are needed to specify each byte in a 512 byte memory unit?
    5·1 answer
  • In a particular jurisdiction, taxi fares consist of a base fare of $4.00, plus $0.25 for every 140 meters traveled. Write a func
    11·1 answer
  • Suppose you have two tables: officer and gentleman. what question(s) can be asked by using the union operator?
    11·1 answer
  • Networking device converts analog signals to digital ones?
    8·1 answer
  • Google's Chrome OS integrates with web servers using cloud computing and storage to run applications and to perform other functi
    10·1 answer
  • 2. 25 POINTS!!!!!!!!!
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!