1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
almond37 [142]
3 years ago
10

Why can’t binary data be represented directly in XML, for example, by representing it as Unicode byte values? XML elements can c

arry strings represented as base64. Discuss the advantages or disadvantages of using this method to represent binary data.
Computers and Technology
1 answer:
notsponge [240]3 years ago
5 0

Answer:

I don't know this answer ask another one

You might be interested in
Directions: On the line before each item, write ”I” if the substance is an electric insulator or “C” if the substance is an elec
Studentka2010 [4]

Answer:

___I__22. paper

___I__23. glass

___C__24. iron

___I__25. plastic

___C__26. gold

__C___27. copper

___I__28. wood

___I__29. Rubber

___C__30. Aluminum

Materials which do not allow current to flow easily are called insulators.

Materials which allows current to flow easily are called Conductors.

8 0
3 years ago
Patrick manages the cloud services that are used by a small hospital system. He knows that there are a lot of laws and regulatio
svet-max [94.6K]

Answer:

a. HIPAA

Explanation:

HIPPA represents the Health Insurance Portability and Accountability Act that of the United States which becomes mandatory for protecting the medical data in any form.

Also in the case of data protection that represent the general regulations, PCI DSS, GDPR etc would be used

So the option a is correct

hence, all the other options are wrong

8 0
3 years ago
The term “frivolous” implies that the author
tiny-mole [99]
Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions.
believes that the average individual does not need a smart phone 
<span>firivolous mean not serious, light, unimportant.</span>

3 0
3 years ago
Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as
evablogger [386]

Answer: Web Browsers

Explanation: The application software that works on the World Wide Web(www) is known as the web browser. Web browsers are the application must be installed on the user's system so that the accessing of the web server can be done.

There are different types of web browsers, out of which the most popular is Chrome and other examples are Internet Explorer, Opera, Firefox etc.

8 0
3 years ago
Read 2 more answers
Which type of systems development is characterized by significantly speeding up the design phase and the generation of informati
nydimaria [60]

Answer:

Joint Application Development (JAD)

Explanation:

Joint Application Development is a method of application development that  lay emphasis on the up-front aspect of the application development cycle whereby steady communication between the designers and the intended users of the application under development by coming together in collaborative workshop styled discussions known as JAD sessions involving the mediators, facilitator, observers, end users, experts, and developers. As such with JAD process application development result in fewer errors high quality and is completed in lesser time.

3 0
3 years ago
Other questions:
  • How many host ip addresses are available on a network with a subnet mask of 255.255.255.192?
    6·1 answer
  • Which is a function of network media?
    11·2 answers
  • NEED HELP NOW 25 POINTS!!!!!!
    15·2 answers
  • Which is an example of Raw Input?
    11·1 answer
  • Public-key cryptography can be used for encryption (ElGamal for instance) and key exchange. Furthermore, it has some properties
    9·2 answers
  • What typically happens by default when a file is double clicked in Microsoft Windows?
    9·1 answer
  • What types of tools are used in the process of a digital or network investigation?
    12·1 answer
  • During data declaration, a name is binded to a memory location, what else can be identify as part of this process?
    12·1 answer
  • HELP AASAP BRAINLIEST JUST HELP
    13·1 answer
  • In cell B20, enter a
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!