1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
3 years ago
11

All data process by a computer must be in 1. binary form 2. Hexadecimal form 3. Duodecimal form 4. Unitary form?

Computers and Technology
2 answers:
Sergeu [11.5K]3 years ago
4 0
Binary form
Those are the crazy 1s and 0s ie (1000100111100)
avanturin [10]3 years ago
3 0

Binary code I believe.

You might be interested in
The local Driver's License Office has asked you to write
Y_Kistochka [10]

One of the most popular object-oriented programming languages is C++. Stroustrup created C++ by adding object-oriented features to the C programming language.

<h3>How do you write a program in C++?</h3>
  • Some people believe that the open-source C++ IDE Dev C++ is one of the finest. However, it may be used exclusively on Windows and macOS. It contains capabilities like profiling, integrated debugging, syntax highlighting, code completion, tool managers, and GCC-based compilers.
  • Many people believe that C++, an object-oriented programming (OOP) language, is the finest language for developing complex applications. The C language is a superset of C++.

#include <iostream>

#include <string>

#include <iomanip>

#include <cctype>

using namespace std;

class TestGrader

{

private:

string answer[20];

public:

void setKey(string[]);

void grade(string[]);

};

/*********************************************************************/

void TestGrader::setKey(string correct[])

{

for (int x = 0; x < 20; x++)

{

 answer[x] = correct[x];

}

}

void TestGrader::grade(string test[])

{

int right = 0;

int wrong = 0;

int count = 0;

for (int x = 0; x < 20; x++)

{

 if (test[x] == answer[x])

 {

  right += 1;

  count += 1;

 }

 else if (test[x] != answer[x])

 {

  wrong += 1;

 }

}

if (count >= 15)

{

 cout << "Congratulations you have passed the driver's license exam" << endl;

}

else

{

 cout << "You failed the driver's license exam" << endl;

}

cout << "You got a total of " << right << " right answers and a total of " << wrong << " wrong answers in the test" << endl;

cout << "You got questions ";

for (int x = 0; x < 20; x++)

{

 if (test[x] != answer[x])

 {

  cout << x + 1 << " ";

 }

}

cout << "wrong" << endl;

}

int main()

{

string answers[20] = { "B", "D", "A", "A", "C", "A", "B", "A", "C", "D", "B", "C", "D", "A", "D", "C", "C", "B", "D", "A"};

TestGrader exam;

exam.setKey(answers);

string yourTest[20];

int choice;

do

{

 for (int x = 0; x < 20; x++)

 {

  cout << "Enter the answer for question " << x + 1 << ": ";

  cin >> yourTest[x];

  while (yourTest[x] > "D"  || yourTest[x] < "A")

  {

   cout << "Please enter from A-D: ";

   cin >> yourTest[x];

  }

 }

 exam.grade(yourTest);

 cout << endl << "Enter -1 to quit, else enter any number to retake the exam: ";

 cin >> choice;

} while (choice != -1);

return 0;

}

To learn more about C++ refer,

brainly.com/question/15411348

#SPJ4

6 0
1 year ago
Anybody know the answer to this question?
aniked [119]

Answer:

sorry i need pointssssss

7 0
3 years ago
Using encryption, a sender can encrypt a message by translating it to which of the following?
Mila [183]

Answer:

Option C is the correct answer for the above question.

Explanation:

The ciphertext is a text which is formed from an original text and can be called a duplicate text which has no meaning for the other user. This can be formed with the help of encryption technology. Encryption technology is a technology that uses some mythology to convert the original data into other text data (which is also called a ciphertext) because no one can able to hack the data.

The above question asked about the term which is called for the text when it is converted from original data. That text is known as ciphertext which is described above and it is stated from option c. Hence option c is the correct answer while the other is not because--

  • Option 'a' refers to the public key which is used to encrypt the data.
  • Option b refers to the private key which is also used for encryption.
  • Option d refers to the sniffer which is not the correct answer.

5 0
3 years ago
How to find no of Distinct triangles in a polygon?
8_murik_8 [283]
Input : N = 6
Output : 6 2
The image below is of a triangle forming inside a Hexagon by joining vertices as shown above.
The triangle formed has two sides (AB and BC) common with that of a polygon. Similarly BC and
CD can make one triangle. With this, we can say that there will be a total of 6 triangles possible
having two sides common with that of a polygon. The second image of a hexagon,
a triangle is formed with no side common with that of a polygon.
There will be just 2 triangles possible, BFD and ACE.


Triangle with two side common and no side common of the Hexagon

Number of triangles formed are 6 and 2 with two side common and with no side common respectively.
Input : N = 7
Output : 7 7
7 0
3 years ago
Dash is a collection of sequentially arranged slides put together in the from of a file​
cestrela7 [59]

Answer: Presentation

Explanation:

A presentation refers to the collection of sequentially arranged slides that are put together in the from of a file​.

Presentations are used by businesses and professional firms to inform, educate, and persuade the audiences. Companies use presentations to train their employees, and communicate with their clients by using words and images to engage them.

7 0
3 years ago
Other questions:
  • it is important to include the __ attribute of the tag because some people use text-only web browsers
    5·2 answers
  • Write a program to read-in a sequence of integers from the keyboard using scanf(). Your program will determine (a) the largest i
    8·1 answer
  • has anyone noticed that brainly has been giving the wrong answers and that the ads are blocking answers or is that just me?
    7·2 answers
  • Ron is the IT director at a medium-sized company and is constantly bombarded by requests from users who want to select customize
    5·1 answer
  • In the receiving computer, UDP receives a datagram from the __________ layer.
    15·1 answer
  • There are many apps that help find you cheaper gas. If the cost of a gallon of regular gas is $3 at one station and $3.50 at ano
    15·1 answer
  • SLA:
    14·1 answer
  • How can you apply multimedia for study explain​
    11·1 answer
  • When creating a storyboard, in which section do you mention how you move from one shot to the next?
    8·1 answer
  • The. Model has the disadvantage of high project cost due to creation several prototypes
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!