1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blizzard [7]
3 years ago
9

A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and stor

age locations.
Computers and Technology
1 answer:
V125BC [204]3 years ago
6 0

Answer:

Machine Language

Explanation:

Machine language is a collection of binary digits or bits that the computer reads and interprets.Machine language is the lowest-level programming language (except for computers that utilise programmable microcode).  Machine language is the only language a computer is capable of understanding.  The exact machine language for a program or action can differ by operating system on the computer. The specific operating system will dictate how a compiler writes a program or action into machine language.

You might be interested in
If one wanted to use the best method to get storage into long-term memory, one would use _________. maintenance rehearsal rote r
anzhelika [568]

Answer:

elaborative rehearsal

Explanation:

when it comes to storage of information or data into long term memory then elaborative rehearsal plays an important role.

Elaborative rehearsal is a technique which focuses on thinking about the piece of information or data's meaning which is to be stored in long term memory and linking it with the information or data which is already present or stored.

7 0
3 years ago
In what year did alienware introduce alienfx lighting zones into their pc's?
ser-zykov [4K]
The answer to the question asked  above is 2006. 
<span>Alienware introduce alienfx lighting zones into their pc's on 2006.</span>

Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.
8 0
3 years ago
"Bullet Lists" can be which of the following?
MariettaO [177]

Answer:

letters and numbered

Explanation:

7 0
4 years ago
Read 2 more answers
Which security testing activity uses tools that scan for services running on systems? reconnaissance penetration testing network
Fiesta28 [93]

Answer:

Network mapping.

Explanation:

Network mapping seems to be the method of mapping the server visibly and rationally in order to determine the relations at mid of the network as well as the not same nodes.

  • Network mapping is the practice of security checking using software to search against services running on networks.
  • Network performance applications and software contains certain network mapping functions that customize the network
7 0
3 years ago
Can somebody show me
OLEGan [10]
So you are gonna read that whole paragraph and then answer the question or describe what you learned about
7 0
3 years ago
Other questions:
  • Which is the best and quickest way for Jim to share his scuba experience with everyone?
    8·1 answer
  • Consider the following statements: #include #include class Temporary { private: string description; double first; double second;
    9·1 answer
  • Computers that belong to the same domain can access a common security database of user and computer account information. This ty
    5·1 answer
  • What is the difference between the paste and paste special options
    8·1 answer
  • What method is used to manage contention-based access on a wireless network?
    7·1 answer
  • Which statement about muzzleloaders is true? All muzzleloaders are rifles. All muzzleloaders have only one barrel. Muzzleloaders
    12·1 answer
  • Search..
    14·1 answer
  • An enhancement to a computer accelerates some mode of execution by a factor of 10. The enhanced mode is used 50% of the time, me
    11·1 answer
  • Which one of the statements best characterizes the current state of e-commerce?
    15·1 answer
  • The hardware and software that must be implemented to support the applications that the primary activities use are a part of the
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!