1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serg [7]
3 years ago
11

Why is digital data, at the base level in computers, represented in binary? * 10 points 0's and 1's are the easiest numbers to d

eal with mathematically. Using decimal or hexadecimal instead would change the meaning of the underlying data. A system with only 2 states is the most efficient way to organize data in a computer. Because other number systems do not allow you to represent both numbers and letters.
Computers and Technology
1 answer:
Liula [17]3 years ago
8 0

Answer:

The representation of the digital data in the computer system in the binary form because it is easier and cheaper to use in the system. It is more reliable to build the machine and the devices for distinguish the binary states.  

Computer basically uses the 0 and 1 binary digits for storing the data in the system. The computer processor circuits are basically made up of the various types of transistors that uses electronic signals for the activation process in the system.

The o and 1 are the binary digits that reflect the different states of the transistor that is OFF and ON state.

You might be interested in
Sydney Bark is twenty-three years old, and is looking forward to celebrating her birthday on April 12. For her birthday, she sav
DochEvi [55]

Answer:

a future date

Explanation:

Because most people when trying to guess a password, start with basic ones like: 1234,abcde, password,l and dates (like their birthday). whereas, the person would never guess it was a future date like when the person would be 30 or when they are going on a trip .

5 0
3 years ago
You are the network administrator for your company. You want to look at some of the resources on the network. Specifically, you
mr Goodwill [35]

Answer:

" Performance Monitor" is the correct solution.

Explanation:

  • The most comprehensive method or indication for viewing but mostly analysis of those same applications as well as hardware-related issues would be determined as "Performance monitor."
  • Performance Monitoring seems to be a combination of methods as well as technologies to assess relatively quickly apps work throughout the data center.

3 0
4 years ago
How can the font type of an existing style named No Spacing be changed?
OLga [1]

Manually change the font type of the style in any place in the document it has been applied, right-click, and select Styles and Update No Spacing to Match Selection.

<u>Explanation:</u>

Styles fonts can be modified directly from home tab by selecting style sheets and apply changes. User can also select existing styles and select save selection as new quick style. Once user selected they can either modify or create new style.

There multiple options are available. End user can select based or their requirements. There is option to do automatic update on styles fonts for open document.

In below screen there is following options, such as fonts, paragraph, tabs, border, language, frame, numbering, short keys, text effects.

User can select fonts and select no of spacing methods and apply the changes to all document or current documents.

6 0
3 years ago
Read 2 more answers
I get brainlist to whoever can help my computer is doing this and I have class and it’s not working and I got it wet yesterday b
liq [111]

Answer:

try putting a lot of rice on the screen.

Explanation:

if it got water in it that should help it.

3 0
3 years ago
Read 2 more answers
When an object reference is passed as a parameter to a method, modifying the members of that object from inside the method will
bogdanovich [222]

Answer:

A) True

Explanation:

Objects are known as reference types, meaning that they are always accessed by references, not copied. When a method is called, passing an object to it, Java passes a reference of that object to the method and when that reference is modified, the changes can be seen in the object itself. Therefore a mutable object can be mutated anywhere- either from where it is created or by a method it is passed to. Hence the need to always use privacy modifier keywords such as public, private or protected, to determine the exposure of class properties and methods.

7 0
3 years ago
Other questions:
  • Convert to octal. Convert to hexadecimal. Then convert both of your answers todecimal, and verify that they are the same.(a) 111
    12·1 answer
  • Please help me out with my essay
    15·1 answer
  • ____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it ove
    15·1 answer
  • Business competition is no longer limited to a particular country or even a region of the world.
    10·1 answer
  • A company decides to relocate its operations to another state in order to take advantage of some new business investment credits
    15·1 answer
  • Your job as a researcher for a college is going well. You have gained confidence and skill at pulling data and you are not makin
    13·1 answer
  • Brooke is trying to save enough money in the next fifteen months to purchase a plane ticket to Australia. Every month Brooke sav
    10·1 answer
  • The EDI ____________layer describes the business application that i
    9·1 answer
  • What is open source software? ​
    8·1 answer
  • If you need any answer answered faster check out Wolframalpha.com
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!