1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
3 years ago
5

01010010 01100101 01100001 01101100 00100000 01101101 01110101 01110011 01101001 01100011 00100000 01110100 01101001 01101100 01

101100 00100000 01110100 01101000 01100101 00100000 01100100 01100001 01111001 00100000 01110111 01100101 00100000 01100100 01101001 01100101 00100000 00111100 00110011
convert to text
Computers and Technology
2 answers:
Harrizon [31]3 years ago
8 0

Answer:

Real music till the day we die <3

Explanation:

Scorpion4ik [409]3 years ago
5 0

Answer:

Real music till the day we die <3

You might be interested in
What program controls the hardware and software in a computer?
larisa86 [58]
The operating system controls hardware and soft
8 0
3 years ago
HELPPPP KOKICHI IS OUT TO KILL ME
Ne4ueva [31]
Oh my- good luck with that-
3 0
2 years ago
Which of the following is a true statement about psychological tests administered by computers? computers make standardization e
Hitman42 [59]
Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions.
the true statement about psychological tests administered by computers is 
<span>most people find computerized tests to be difficult to understand. </span>
7 0
3 years ago
Cuando se creo argentina​
vekshin1

Answer:

Argentina se creó tras su independencia respecto de España el 9 de julio de 1816, tras 6 años de guerra por la independencia del país, donde líderes como Manuel Belgrano, Martín Miguel de Güemes y José de San Martín derrotaron a los españoles.

La unidad nacional de los argentinos, a su vez, se originó tras las invasiones inglesas de 1806 y 1807, y se consolidó tras la conquista de España por parte de los Bonaparte, que dio origen a la Revolución de Mayo de 1810, donde los argentinos decidieron imponer un gobierno propio.

7 0
3 years ago
o maintain reasonable key security (mark all that apply): Ensure that someone else always has an extra key. Ensure that no extra
Komok [63]

Answer:

The answer is "second, third, and fourth choices"

Explanation:

In the question the numbering of the choices were missing if we numbering the choices so, the first choice will be one first number and second choice is in second and so on, and its explanation can be defined as follows:

The network safety key is a type of network login credentials or passwords which is used for provides authorization as well as access the network or device upon which client requests to communicate throughout the form of physical, digital, or biometrical information login.  

  • It doesn't ensure the extra key.  
  • It helps ensure there were no additional duplicates.  
  • It keeps strict access codes as well as keys command.  
  • It makes sure, that its key could not be linked to able to operate the lock.
6 0
3 years ago
Other questions:
  • If you quote an author from a website in a paper, it will be important to create a _____ in your writing to give them credit for
    7·2 answers
  • What are some ways to accept data typed into a cell? Check all that apply.
    15·1 answer
  • Emma has decided that she needs to assess the risk and return of buying an extended warranty for her new laptop for school
    15·1 answer
  • How do you interpret field in contest of a DBMS?
    5·1 answer
  • Describe how data center storage applications drive the development of SAN technology.
    8·1 answer
  • How can I collect tweets from different accounts concurrently and categorize the tweets in a corpus?
    15·1 answer
  • Who can search the internet and select element base on important words
    13·1 answer
  • You want to substitute one word with another throughout your document. What tool(s) should you use?
    9·1 answer
  • write ms-dos command to list all the files and folders of EIGHT sub directory of C: drive in ascending order according to file n
    5·1 answer
  • Operating systems move code and data, as necessary, to a portion of the disk that is used as if it were memory, not just disk st
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!