1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
love history [14]
3 years ago
8

3 uses of base 10 in computer systems

Computers and Technology
1 answer:
kkurt [141]3 years ago
3 0
In any positional system of representing numbers, the number is important because it is equal to (in fact represents) the base . the base is typically (though not necessarily) some integer greater than (the multiplicative identity). for instance, decimal uses the digits , , binary uses , .
You might be interested in
Explain how the organ systems work together to warm up the body on a cold day
Tatiana [17]

Answer:

Your body is to cold ,blood vessels in the skin contract , and blood flow to the extremities (arms and legs)slows . muscles contract and relax rapidly which generates  heat to keep you warm..

Explanation:

Hope this helps :)

6 0
3 years ago
Read 2 more answers
DES: Group of answer choices A) is a commonly used symmetric encryption B) algorithm that was developed in the mid-C) 1970s was
OLEGan [10]

DES is a commonly used symmetric encryption

A) is a commonly used symmetric encryption

<u>Explanation:</u>

DES stands for Data Encryption Standard. It is a symmetric key algorithm and is used for encrypting electronic data. It was developed in 1975. DES is one of the oldest encryption standards to be used in the industry.

The algorithm takes 16 rounds of permutations in order to encrypt data. But now, with the advent of technology, as new algorithms have been designed and put in use, DES is less preferable.

In the process of key generation, some keys generated sometimes turn out to be weak and hence are prone to attacks. If not for the weak keys generation, DES works perfectly fine and is an effective algorithm to encrypt data.

6 0
3 years ago
Derek is working at the help desk when he receives a call from a client about an issue with the company's email. The customer is
jeka57 [31]

Answer:

Give the customer time to express his/her anger and then restart the conversation.

Explanation:

A person working as a help desk executive is meant to be equipped with customer service skills and experience. They are the mediator between the customers and the actual service providers in a company.

A good help desk executive should have good communication skills, they should have the ability to diffuse tension which it needed in this context.

7 0
3 years ago
If your computer has a ________, someone else can gain access to it undetected.
irinina [24]
<span>If your computer has a rootkit, someone else can gain access to it undetected.
</span>The term rootkit denotes a set of software tools <span>typically malicious.
 The purpose of this software is to enable access to a computer or areas of its software that is not otherwise allowed.
</span><span>It is one of the most difficult types of malware to find and remove.</span>
3 0
3 years ago
To erase a character to the right of the insertion point, press the ____ key(s).
jeka94
<span><span>CTRL+HOME then delete, backspace, end.</span></span>
8 0
3 years ago
Other questions:
  • What is the software called that allows the user to create, access, and manage a database? question 8 options:
    10·1 answer
  • To name a computed field, follow the computation with the word ____ and then the name you wish to assign to the field
    8·1 answer
  • Which of the following is the final fate for average sized stars?
    12·1 answer
  • By placing the chorale melody in the highest voice and using a simple harmonization, bach made it easier for congregation member
    5·1 answer
  • A bank uses a computer program during the night to tell if the alarm should ring. Sensors in the bank set the following Boolean
    5·1 answer
  • . What is the difference between a combinational circuit and sequential circuit? Give example of each.
    8·1 answer
  • Display all the lines in unixPasswd that contain at least 10 consecutive lowercase letters. How many names are there in total th
    12·1 answer
  • What is one disadvantage of transmitting personal data using digital signals?
    15·2 answers
  • The best way to deal with crying children in the car is to ignore them or pull off the road
    15·1 answer
  • Html is a markup language that lets you identify common sections of a web page
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!