1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
3 years ago
11

What is the hexadecimal equivalent of the decimal number 256?

Computers and Technology
1 answer:
svp [43]3 years ago
3 0

Answer:

0.100 look it up

Explanation:

You might be interested in
Please help me!! 10 Points are waiting!!
prisoha [69]

Google

https://google.com

Google has a large index of keywords and where those words can be found. Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

3 0
3 years ago
Answer 1 question and get 10 points in return
AlekseyPX

Answer:

3

Explanation:

sorry if I'm wrong...it's been a while since I took a coding class.

5 0
3 years ago
Read 2 more answers
When _______ wordart, you need to consider both the font size of the text and the size of the text box that contains wordart?
padilas [110]
The correct answer is resizing. If you're making a logo and creating wordart. you have to care about resizing because the art needs to be clearly visible and appealing no matter the size. If you place it in a box, you have to care that it doesn't go over the edges of the box or anything similar that might seem appalling.
4 0
4 years ago
A _______ record is responsible for resolving an IP to a domain name.
lianna [129]
An "Address" record also know as "host" record
3 0
3 years ago
Read 2 more answers
Which is the last line of defense in a physical security sense?
Deffense [45]

Answer: (A) People

Explanation:

 The physical security system is the basically used in the information system. It is used in the technical and the administrator element in the security system. This is the technology oriented system that is basically used to prevent from the hacking attacks in the system.

So, the people is the last statement of the defense in the physical security as the various security system is basically used by various people.

4 0
3 years ago
Other questions:
  • HURRRYY After pasting the information on the left side of the comparison slide, Jamal notices the text box extends beyond the bo
    9·1 answer
  • ______________is a collection of technologies for abstracting the details of how applications, storage, network, and other compu
    6·1 answer
  • What are three reasons teens might start drinking alcohol??
    7·2 answers
  • Summarize the four critical issues for cyber warfare.
    6·1 answer
  • If you used a peach as a model of an animal cell, what would the peach's skin represent? A.nucleus B.cell wall C.cytoplasm D.cel
    10·2 answers
  • Hello! I hope you have a great day! Good things will come your way.
    12·1 answer
  • Describe the uses of computer in different fileds? please help me ​
    14·1 answer
  • .WAP to enter monthly sale of Salesman and give him commission i.E. If the monthly sale is more than 500000 then commision will
    6·1 answer
  • How do i automate survey monkey results to my email
    11·1 answer
  • Select the correct answer.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!