1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
3 years ago
10

What does my name look like in binary code, btw my mane is Wendy Alexis Morales

Computers and Technology
2 answers:
jekas [21]3 years ago
6 0
01010111 01100101 01101110 01100100 01111001 00100000 01000001 01101100 01100101 01111000 01101001 01110011 00100000 01001101 01101111 01110010 01100001 01101100 01100101 01110011
Nookie1986 [14]3 years ago
6 0

Answer:

01010111 01100101 01101110 01100100 01111001 00100000 01000001 01101100 01100101 01111000 01101001 01110011 00100000 01001101 01101111 01110010 01100001 01101100 01100101 01110011

You might be interested in
Topic: Video Games
barxatty [35]

Answer:

Hikaru from kingdom hearts 3 :)

Explanation:

6 0
3 years ago
Which of the following is an example of a Boolean condition that Python could recognize?
Mila [183]
Your answer should be “B”.

i really hope i could help! good luck :)
7 0
4 years ago
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
Anni [7]

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

6 0
3 years ago
Discuss the technologies that implements an infrastructure for component communication
Akimi4 [234]

Explanation:

Consulting and system integration services are relied on for integrating a firm's legacy systems with new technology and infrastructure and providing expertise in implementing new infrastructure along with relevant changes in business processes, training, and software integration. Legacy systems are generally older transaction processing systems created for mainframe computers that continue to be used to avoid the high cost of replacing or redesigning them.

THE IT INFRASTRUCTURE ECOSYSTEM

There are seven major components that must be coordinated to provide the firm with a coherent IT infrastructure. Listed here are major technologies and suppliers for each

4 0
3 years ago
The best resolution for photos to be used in web pages viewed over slow telephone line is:
meriva
The more the image resolution would be the more storage it needs. If you think about it when a website tries to load a large image it takes longer than loading a smaller one. Hence, if you have a slow telephone line and need your images to be displayed (loaded) faster, then you have to go with the smallest resolution (the smallest storage).

In a nutshell, your answer will be d) 320x240

Note: 320 x 240 is the dimensions of the image (width x height) and those numbers are measured in pixels which is the unit of measuring images, display screens,...etc. i.e. this image is 320 pixels in width and 240 pixels in height
3 0
3 years ago
Other questions:
  • Which argument forces a writer to return to and change the input before resolving a “UnicodeError”?
    10·1 answer
  • (GAME DESIGN)
    15·1 answer
  • Using a loop, write a program that reads in exactly five integers and outputs the sum.
    11·1 answer
  • You’re responsible for an always-on VPN connection for your company and have been told that it must utilize the most secure mode
    12·1 answer
  • How do switches and bridges learn where devices are located on a network?
    5·1 answer
  • __________ is a website that offers a variety of Internet services from a single, convenient location.
    13·1 answer
  • What is the process of designing green buildings called
    9·2 answers
  • Gus has decided to organize his inbox on June 26th by using folders and deleting irrelevant messages
    10·2 answers
  • Write a python program to calculate the average of two numbers​
    8·1 answer
  • Animation timing is does not affect the
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!