1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavel [41]
4 years ago
8

How does binary work? ​

Computers and Technology
2 answers:
Ganezh [65]4 years ago
7 0

binary work with two numbers that is 0 and 1

MakcuM [25]4 years ago
6 0

Answer:

The 0s and 1s in binary represent OFF or ON respectively. In a transistor, an "0" represents no flow of electricity, and "1" represents electricity being allowed to flow. In this way, numbers are represented physically inside the computing device, permitting calculation. This concept is further explained in our section on how to read binary numbers.

You might be interested in
Which of the following are addressed by programing design? Choose all that apply.
Viktor [21]

Answer:

Its B, D, and E

Explanation:

Hope this helps

6 0
3 years ago
Read 2 more answers
Write the formal descriptions of the following sets: (a) The set containing the numbers 5, 9, and 27. (b) The set that contains
Dominik [7]

Answer: a) =\left \{ 5,\,9,\,27 \right \}

(b) \left \{ x\ : X\varepsilon\mathbb{N} \right \text{and}\ x

(c) \left \{\epsilon \right \}

(d) \left \{\right \}=\phi

Explanation:

The formal description of the given sets are as follows :-

a) The set containing the numbers 5, 9, and 27.

=\left \{ 5,\,9,\,27 \right \}

(b) The set that contains all the natural numbers less than 2.

\left \{ x\ : X\varepsilon\mathbb{N} \right \text{and}\ x

(c) The set containing the empty string.

We know that in formal description, the empty string is denoted with \epsilon.

Thus, the required set : \left \{\epsilon \right \}

(d) The set containing nothing at all.

\left \{ \right \}=\phi

7 0
4 years ago
Why will it take so long to complete the high-speed rail route?
koban [17]
It will take a while for all of the necessary safety inspections. 
3 0
3 years ago
Read 2 more answers
You are a very small company that sells healthcare insurance plans. You estimate that the breach of your customer database will
lozanna [386]

Answer:

C. Accept the risk

Explanation:

The first option is close but might not be suitable for a small company considering it's cost.

The second option which is to spend fifty thousand dollars per year on a data loss prevention solution is projected to cost you more than the risk.

The third option isn't specific and lacks a course of action.

6 0
3 years ago
Which of the following are considerations in e-commerce and e-government Internet sites? Check all of the boxes that apply.
vovangra [49]

Answer:

protection of sensitive information

Explanation:

6 0
3 years ago
Other questions:
  • To operate a vehicle in Florida, you must _____.
    9·2 answers
  • . How are returnspredicted in modern microprocessors?
    9·1 answer
  • In one to two sentences, explain how to save a new document.
    15·2 answers
  • Write a complete program that declares an integer variable, reads a value from the keyboard into that variable, and writes to st
    11·1 answer
  • Describe data center technology and its relevance to modern-day cloud computing
    14·1 answer
  • You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to acc
    6·1 answer
  • Which type of graph or chart measures
    15·2 answers
  • The four general functions of any application program are: data storage, data access logic, application logic and presentation l
    11·1 answer
  • Star and peer-to-peer are types of
    9·2 answers
  • On a cdma (code division multiple access) network, how are mobile handsets identified by the carrier?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!