1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
3 years ago
10

What does my name look like in binary code, btw my mane is Wendy Alexis Morales

Computers and Technology
2 answers:
jekas [21]3 years ago
6 0
01010111 01100101 01101110 01100100 01111001 00100000 01000001 01101100 01100101 01111000 01101001 01110011 00100000 01001101 01101111 01110010 01100001 01101100 01100101 01110011
Nookie1986 [14]3 years ago
6 0

Answer:

01010111 01100101 01101110 01100100 01111001 00100000 01000001 01101100 01100101 01111000 01101001 01110011 00100000 01001101 01101111 01110010 01100001 01101100 01100101 01110011

You might be interested in
You cannot then move and resize the control on the form as desired with your mouse TRUE OR FALSE​
Sindrei [870]

Answer:

False

Explanation:

4 0
3 years ago
Read 2 more answers
What is one advantage of hard-disk recording?
NemiM [27]

Answer:

It allows for Non-linear editing

7 0
3 years ago
12. What are the additional elements required of a network architecture if the enclave is to support remote access through the p
Romashka [77]

The additional elements needed of a network architecture are:

  • Policy management
  • Remote access server
  • VPN Gateway, etc.

<h3>What is network architecture example?</h3>

Network architecture is known to be the set up of a computer network. It is regarded as the backbone for the specification of the physical attributes of a network and also their functional configuration.

An examples is a printer that is linked to the network. Note that  additional elements required of a network architecture if the enclave is to support remote access through the public Internet are Policy management, etc.

Learn more about network architecture from

brainly.com/question/13986781

6 0
2 years ago
Which of the following statements is true?
Lilit [14]

Answer:

Option A is the correct answer choice for the above question.

Explanation:

The computer system needs intercommunication which is done inside the processor to process the task given by the user. There are two types of model is used for intercommunication--

  1. Message passing and
  2. Shared memory

The difference between two is that message passing passes the message on two points at a single unit of time whereas shared memory simultaneous shares the multiple messages. That's why shared memory is faster than message passing.

  • Hence option A is the correct choice because it also refers to the above concept. While the other is not correct because--
  • Option B states that message passing is faster than shared memory which is wrong.  
  • Option C states that message passing is used for large data but shared memory is used for large data.
  • Option D states that shared memory is unavailable in some processor which is wrong.
3 0
3 years ago
Which tools allows you to see the edition, version and memory use by windows 10?
cricket20 [7]

Answer:

Resource Monitor

Performance Monitor

Computer Management and Administrative Tools

Advanced User Accounts Tool

Disk Cleanup

Local Group Policy Editor

There is alot do u want them all?

6 0
3 years ago
Other questions:
  • Which type of statement is used to communicate one’s feelings in a nonconfrontational manner?
    14·1 answer
  • What languages do most of the students at Miami High School speak?
    6·2 answers
  • Brute force attacks involve identifying a valid user account and then bombarding the server with an extensive:
    13·1 answer
  • A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus s
    12·1 answer
  • The World Wide Web Consortium enforced a stricter set of standards in a different version of Hypertext Markup Language (HTML) ca
    7·1 answer
  • When looking at a relationship between two tables on an ERD, the _____ table can be identified by the presence of a foreign key
    8·1 answer
  • Describe the advantages of this trend from the point of view of the patient or the healthcare provider.
    5·1 answer
  • Write a Java program to create a class called Cars. The class should include three instance variables: makes (type: String), mod
    12·1 answer
  • What is it called when you remove some information from a file or remove a file from the disk ? A) save b) delete c) edit d) rem
    5·1 answer
  • Compare and contrast Charles bebbage and Blaise Pascal inventions<br>​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!