1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
USPshnik [31]
3 years ago
13

Which of the following best describes how computing devices represent information?

Computers and Technology
2 answers:
Sergeeva-Olga [200]3 years ago
7 0

Answer:

The answer is "C"

Explanation:

In the computer system, the data which separates a data object into relevant concepts is known as data representation. In the representation of data, it uses the binary digits, that are in the form of '0 and 1'. It is used by computers to store information and these numbers are also known as bits, and wrong choices can be defines as follows:

  • In option A, It is wrong because when we see the file details it shows both.
  • In option B, It's incorrect because the smallest unit of data representation is bits.
  • In option D, It is incorrect because bits includes only "0 and 1".
kompoz [17]3 years ago
5 0

Answer:

D

Explanation:

You might be interested in
Which type of computer application is apple keynote? a. word processor b. spreadsheet c. presentation d. database e. multimedia
Naily [24]

The type of computer application which apple keynote is, is: c. presentation.

<h3>What is a presentation application?</h3>

A presentation application can be defined as a type of computer application which is designed and developed to avail its end users an ability to create various slides that comprises both textual and multimedia information, which are typically used during a presentation.

This ultimately implies that, apple keynote is an example of a presentation application which is used on computers.

Read more on presentation application here: brainly.com/question/26404012

#SPJ4

4 0
2 years ago
HELPPPPPPPP
Reika [66]
The answer is visual hierarchy :)
4 0
3 years ago
Read 2 more answers
hackers can use as part of a reconnaissance process to learn about active network addresses and active processes?
aalyn [17]

Answer:

ICMP.

Explanation:

Hackers might use ICMP for gain knowledge about current system addresses and specific procedures as part of a reconnaissance process.

ICMP is a failure informing system used by network protocols such as routers to produce warning to that of the source Address while network issues interrupt IP packet transmission.

3 0
3 years ago
_____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.
sineoko [7]
Hello <span>Rfieldgrove1102 </span><span>

Answer: EDI enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.


Hope that helps
-Chris</span>
4 0
4 years ago
Under Juran's Law, whenever a problem occurs, what percentage of the time is the problem the result of a system/process error?
quester [9]

Answer:

C. 85 percent

Explanation:

Juran's Law is a law used in the category of Total Quality Management. This law states that whenever a problem occurs during a process, only about 15% of the time is it the individual's fault, the rest of the time it is the process's fault. Therefore 85% of the time, the problem is the result of a system/process error.

7 0
3 years ago
Other questions:
  • If a friend changes the password on your phone how do you get into it if you dont know the password
    12·1 answer
  • Which computer device is used to capture or copy a photograph to place in a report?
    14·1 answer
  • What are voter purges
    11·1 answer
  • Given two Generic variables, A with value "123" and B with value 456, what would the Write Line output of A + B be? 123456 579 A
    5·1 answer
  • When a bank account pays compound interest, it pays interest not only on the principal amount that was deposited into the accoun
    15·1 answer
  • An email address contains the @ character. Write a program that takes asks for an email address input from the user and determin
    5·1 answer
  • What best describes "broadband access"? a. broadband access is a specific term used to describe the delivery of one-way televisi
    5·1 answer
  • Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (a
    14·1 answer
  • Write an if statement that prints the message ""The number is not valid"" if the variable distance is outside the range 100 thr
    8·1 answer
  • I need a computer science help.....and I rlly want it right now...this the question
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!