1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UkoKoshka [18]
3 years ago
11

Digital information is stored using a series of ones and zeros. Computers are digital machines because they can only read inform

ation as on or off –1 or 0. This method of computation is known as the ____________ system.
Computers and Technology
2 answers:
ryzh [129]3 years ago
8 0
Is known as the binary system
kondor19780726 [428]3 years ago
8 0

The answer is: Binary

This method of computation is known as the Binary system.

You might be interested in
What is the way to discover requirments for software projects ?
Sav [38]

Learn about requirement analysis by knowing how to identify business requirements and software requirements with ... Here are the objectives for performing requirement analysis in the early stage of a software project:.

6 0
2 years ago
In the layers toolbar, which layer will appear in front of your game
nekit [7.7K]
The top layer will appear.
5 0
3 years ago
Choose the correct term to complete the sentence.
devlian [24]
Smartphones! because mobile apps go on smartphones
8 0
3 years ago
Read 2 more answers
A(n ____ is information that a web server stores on a client computer, such as the client’s preferences when accessing a particu
gayaneshka [121]
<span>A COOKIE is information that a web server stores on a client computer, such as the client’s preferences when accessing a particular web site, or where the client has been on the web site.</span>
7 0
2 years ago
from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing
Brums [2.3K]
From January 2005 through July 2017, approximately 853 million electronic data records in the US were breached.
This allowed the attackers to take control over people's personal data, such as their various credit card numbers, and other important data, as well as their addresses, etc. The cyber police, as well as the regular police have been working hard to stop this from happening, but the hackers are very strong and smart.
4 0
3 years ago
Other questions:
  • Write a MARIE program to allow the user to input 8 integers (positive, negative, or zero) and then find the smallest and the lar
    15·1 answer
  • Which is the best description of the difference between bound and unbound forms? O Bound forms are similar to hierarchical forms
    7·1 answer
  • _____ remove the part of an image starting from an edge​
    13·1 answer
  • The region which satisfies all of the constraints in graphical linear programming is called the:
    8·1 answer
  • Explain the functions of a VDU?
    6·1 answer
  • What are the benefits of building redundancy into a network?
    12·1 answer
  • Someone talk to me please........
    5·2 answers
  • Please Help!
    13·1 answer
  • Cora is writing a program to make a motorcycle racing game. If Cora wants the speed of the motorcycle to appear on the screen wh
    5·2 answers
  • Why is quantum computing potentially a better fit for weather forecasting than classical computers?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!