1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
taurus [48]
3 years ago
9

A digital artist makes an image where each pixel is represented by 9 bits - 3 for each of red, green, and blue. Which of the fol

lowing is the correct binary representation for green, using 9 bits?
a) 000111000

b) 111000000

c) 000000111

d) 101101101

pretty sure it's A
Computers and Technology
1 answer:
alex41 [277]3 years ago
4 0
Yup it’s A.) 000111000
You might be interested in
The mac group does not replace the primary functions of eocs or other dispatch organizations. True or False
Oxana [17]

Answer:

TRUE

Explanation:

MAC - multi-agency coordination is a group of executives or administrators that have the authority to control agency funds or resources while EOCs -  Emergency operation centers are in charge of carrying out of emergency tasks that requires preparedness or disasters, they ensure that work continues even in case of emergency and disasters.

7 0
3 years ago
What happens once the Insert tab is used in PowerPoint to insert a chart into a presentation?
DochEvi [55]

Answer:

A (because you can't have a chart without information, right?)

brainliest plz

Explanation:

8 0
3 years ago
Read 2 more answers
A _____ is a collection of (potentially) thousands of computers that can respond to requests over a network
Rom4ik [11]

Answer:

server or supercomputer

Explanation:

5 0
2 years ago
The term which refers to the attempt to gain unauthorized access to systems and computers used bya telephone company to operate
Alex787 [66]

Answer: Phreaker

Explanation:

Phreaker is defined as the unauthorized attack on  authorized communication system for stealing and manipulation phone networks.

  • Exploring,searching and identifying telecommunication field with help of technologies,equipment,tools etc is done to exploit the system and resources .
  • Other options are incorrect because phone hacking is attacking phone device, [email protected] is also hacking source and hacktivist hacks system to impact social and political field.
  • Thus, the correct option is option(d)
8 0
3 years ago
Write a function shampoo_instructions() with parameter num_cycles. If num_cycles is less than 1, print "Too few.". If more than
EastWind [94]

Answer:

Following are the code to the given question:

def shampoo_instructions(num_cycles):#defining a method shampoo_instructions that accepts num_cycles as a parameter

   if num_cycles < 1:#defining an if block that num_cycles value is less than 1

       print('Too few.')#print message  

   elif num_cycles > 4:#defining elif block that checks num_cycles is greater than 4

       print('Too many.')#print message  

   else:#defining else block

       N= 1;#defining N variable that holds a value 1

       for N in range(N, num_cycles+1):#defining for loop that check value in range

           print(N , ": Lather and rinse.")#print message  

       print('Done.')#print message  

shampoo_instructions(2)#calling the method

Output:

1 : Lather and rinse.

2 : Lather and rinse.

Done.

Explanation:

In this code, a method "shampoo_instructions" is defined, that accepts a variable "num_cycles" in its parameter, and in the next step, the multiple conditional statements have used that check the "num_cycles" values which can be defined as follows:

  • The if the block checks the parameter value is less than 1, and it prints the value as the message.
  • In the next step, the elif block is used that checks parameter value is greater than 4, and it prints the value as the message.
  • In the else block, it uses the for loop that checks the value in the range and prints its value and calling the method.
6 0
3 years ago
Other questions:
  • What are operational databases
    12·1 answer
  • In Labrador retrievers, black coats are dominant and brown coats are recessive. What is the genotype of a brown Labrador?
    5·1 answer
  • Which of the following is NOT a valid declaration for a character string?
    8·1 answer
  • Your program will read a word (or a whole line) from the user. It will then count the number of vowels in the word (or line) and
    12·1 answer
  • Which one is correct
    8·1 answer
  • Which elements of a myth appear in this story from early babylon
    14·1 answer
  • C. An error that due to wrong input.​
    13·1 answer
  • Which among the following shortcut key is used to check spelling​
    12·2 answers
  • LIST THE BEST 10 3D PRINTERS WITH THEIR RESPECTIVE APPLICATION SOFTWARES.
    5·2 answers
  • Click the _______________________________ button in the css designer panel to create a new css files, or define an existing exte
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!