1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ser-zykov [4K]
3 years ago
9

In addition to the decimal number system, the number systems used most often in PLC operationand programming are ________.

Computers and Technology
1 answer:
otez555 [7]3 years ago
7 0

Answer: PLC uses:

1. Decimal Number system

2. Binary Number system.

3. Octal Number system.

4. Hexadecimal Number system.

5. Binary Coded Decimal Number system.

6. Negative Number system.

7. Number Conversations.

Explanation: The other numbers the Programmable Logic Controller(PLC) uses aside the decimal number system are:

1. Binary Number system.

2. Octal Number system.

3. Hexadecimal Number system.

4. Binary Coded Decimal Number system.

5. Negative Number system.

6. Number Conversations.

You might be interested in
What might happen if Python code is not in the correct order? The computer will fix the steps automatically. The computer will f
Vesna [10]

Answer:

The computer will follow the steps, but the program might not work.

Explanation:

4 0
3 years ago
Read 2 more answers
Does anyone know this? Can someone please help me? I’ll give brainliest!!
tatuchka [14]

Answer:

c. HTML tags

Explanation:

4 0
3 years ago
In the absence of a cybersecurity theory, we have security standards, frameworks and best practices. An example of best practice
Galina-37 [17]

Answer:

a. to use a password of a certain composition and strength, such as minimum 8 characters.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In the absence of a cybersecurity  theory, we have security standards, frameworks and best practices.

An example of best practices in cybersecurity is the use of a password of a certain composition and strength, such as minimum 8 characters. This would ensure there's a formidable wall to protect data and an unauthorized access or usage of the system network.

7 0
4 years ago
Read 2 more answers
Design a class named Car that has the following fields:
Archy [21]

Answer:

public  class Car {

   private int yearModel;

   private String make;

   private int speed;

   

   public Car(){

       yearModel = 2000;

       make = "Nissan";

       speed = 4;

   }

   

   public Car(int yearModel, String make, int speed) {

       this.yearModel = yearModel;

       this.make = make;

       this.speed =speed;

   }

   

   public void setYearModel(int yearModel){

       this.yearModel = yearModel;

   }

   public void setMake(String make){

       this.make = make;

   }

   public void setSpeed(int speed){

       this.speed = speed;

   }

   

   public int getYearModel(){ return yearModel; }

   public String getMake(){ return make; }

   public int getSpeed(){ return speed; }

   

   public String toString(){

       return "Car's year model: " + getYearModel() + ", make: " + getMake() + ", speed: " + getSpeed();

   }

}

Explanation:

<em>Variables</em> are declared.

<em>No-arg constructor</em> is created with default values.

<em>A constructor with parameters</em> is created.

The required <em>set methods</em> and <em>get methods</em> are created.

<em>toString</em> method is created to return car's specifications.

3 0
3 years ago
Which tectonic plate setting is associated with the following features: great earthquakes; explosive volcanic eruptions; oceanic
yarga [219]

Answer:

Convergent Plate Boundary (subduction zone)

Explanation:

A convergent plate boundary is a location where two tectonic plates are moving toward each other, often causing one plate to slide below the other (in a process known as subduction). The collision of tectonic plates can result in earthquakes, volcanoes, the formation of mountains, and other geological events. An example is the one the formed Andes Mountain.

Cheers

8 0
3 years ago
Other questions:
  • You want to plug a keyboard into the back of a computer. you know that you need to plug the keyboard cable into a ps/2 port. whi
    9·1 answer
  • 4.
    13·1 answer
  • How can you re-engage users who have abandoned your app after their first use?
    12·2 answers
  • Quantas calorias os adolescentes devem consumir diariamente?
    14·1 answer
  • Your mother wants to purchase a larger hard drive for her computer and asks you to see what type of drive interface she has. her
    6·2 answers
  • The purpose of a function that does not return a value is
    13·1 answer
  • What is JavaScript? JavaScript is a _____ language.
    6·2 answers
  • True or False: Variablename must start with a number.
    13·1 answer
  • What is the solution to the equation ?
    8·2 answers
  • How does abstraction make programming languages easier to use
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!