1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aalyn [17]
4 years ago
15

Directions: Using the decoder key and the code chart on the second page, find out the name that has been coded. After coding the

name, move down two rows and code your first name; (1 blank row between coding and no nick names.) Code yourlauber. Use the fill option to color needed blocks.
 
Binary Name
Code Letter
Computers and Technology
1 answer:
Karo-lina-s [1.5K]4 years ago
7 0

What is the decodder key???

You might be interested in
My mom works from home selling her craft work online to people all over the world. She can do this from home because we have acc
8_murik_8 [283]
I would go with A) The Internet 


I hope that turns out well for you. Good luck! (:
6 0
3 years ago
Which of the following are examples of structured data?
Burka [1]

Answer:taffif

Explanation:

4 0
4 years ago
What is metrical task system algorithm?? and can we use that in online shopping project??
jeyben [28]

Answer:

Metrical task system algorithm is the online algorithm that is used for organizing the online problems like k-server issues, paging issues etc.This task system works in the form of metrics to decrease the complete cost  experienced due to processing of the operation and analyzing the competition.

It can be used for the online shopping project for the analyzing the comparison between the performance on basis of online and offline trends and then optimization can take place according to the the results.

7 0
4 years ago
In what cases would you denormalize tables in your database?
ad-work [718]

Answer: Denormalize is the mechanism is carried out by addition of the redundant bits in the already normalized database.The data is attached in the form of attributes,adding new tables.

This technique is used in the case of previously normalized data collection which requires improvement in the performance by reducing the errors.The improvement is made by making database readable ,adding  group of data in redundant form etc.

When data is to be retrieved quickly then also denormalization is used as by grouping or collecting information into a single table.

6 0
3 years ago
A U.S. social security number consists of a string of 9 digits, such as "444422333". Assume that input consists of a sequence of
harkovskaia [24]

Answer:

767745089

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Users of an extranet can access a company or organization’s entire intranet
    8·2 answers
  • Mindy wants to create a new subdirectory at ~/2019projects/projectx/projectplans to start storing the initial project plans for
    14·1 answer
  • What is the keyboard shortcut to display the merge to printer dialog box?
    5·1 answer
  • Type the correct answer in the box. Spell the word correctly. Which framework can be used to develop cross-platform applications
    15·2 answers
  • The letters LAN stand for Area Network.
    9·2 answers
  • 12) If the image's name is filename.gif, how can I make this image the background of my page?
    6·1 answer
  • Write a program that prompts the user to enter three cities and displays them in ascending order. Here is a sample run: Enter th
    8·1 answer
  • Network footprinting is used to ______________________. Group of answer choices test for vulnerabilities determine what services
    12·1 answer
  • Question:
    6·2 answers
  • What symbol do we use to assign a value to a variable or constant in algorithms?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!