1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
3 years ago
11

Besides the decimal number system that is most common (base 10), two other number systems that can be used in c++ programs are _

_______.
Computers and Technology
1 answer:
Paha777 [63]3 years ago
7 0

Answer:

Binary number system

ASCII number system

Explanation:

C++ uses binary number system to define machine level language of the code written in high level languages and ASCII system to define the characters on key board for background low level coding an thus each character on the keyboard has a number associated with it to define it uniquely.

You might be interested in
Typically, when an organization purchases Internet access from an Internet Service Provider (ISP), the ISP will grant it
hodyreva [135]

Answer:

(B) A single public IP address that it can use for NAT

Explanation:

Because the IPV4 IP protocol is still used today, the number of available IP addresses is limited (only 4,294,967,296 addresses in the world), for this reason, the most correct practice is the assignment of a single public IP to those companies that acquire services from an ISP, with some few exceptional cases of companies that own several.

So that the company's addressing can be executed successfully, the use of NATs is enabled, this allows the translation of network addresses, allowing the company to have as many private networks as necessary and that these can be communicated Correctly with the global network, the Internet, through the public IP of the company.

7 0
3 years ago
To add text to a blank slide layout, _____.
Basile [38]
B, draw the text box
3 0
3 years ago
Select the statements below that correctly match the meaning of the letter in the concept of developing SMART goals?
fenix001 [56]

Specific, Measurable, Attainable, Relevant and Timely.

6 0
3 years ago
A hacker corrupted the name:IP records held on the HOSTS file on a client, to divert traffic for a legitimate domain to a malici
balu736 [363]

The type of attack that the hacker performed is Domain Name System (DNS) server cache poisoning.

<h3>What is DNS poisoning?</h3>

In Domain Name System (DNS) server cache poisoning, the hackers often enter into a DNS server because they want to make an adjustment to its directory so that it can point the domain name users enter to a wrong, IP address.

Note that Domain Name Server (DNS) poisoning is a form of system attack in which there is the change of DNS records which are then used to redirect online traffic to a wrong website.

Learn more about hacker  from

brainly.com/question/24956493

7 0
2 years ago
Technological advancements during the industrial age provided Americans with:
Tems11 [23]

Technological advancements during the industrial age provided Americans with option B) More leisure times.

<h3>What were some technological advancements during the age of industry?</h3>

The growth in productivity is one that started with a little technical devices, such as the spinning jenny, spinning mule, and others.

Note that Technological advancements during the industrial age provided Americans with option B) More leisure times as machines does the work.

Learn more about Technological advancements from

brainly.com/question/2166344
#SPJ1

7 0
2 years ago
Other questions:
  • ___ is the branch of computer science that explores techniques for incorporating aspects of intelligence into computer systems.
    5·1 answer
  • What color model should Joe use if he will be using an offset printing press?
    7·1 answer
  • When you make a pointer variable im C++, is star label a must?
    9·1 answer
  • Advantages of a personal area network
    5·1 answer
  • 4. The NIMS Management Characteristic of Chain of Command and Unity of Command means that each person: A. Continues to report di
    9·1 answer
  • What are the key goal, performance, and risk indicators?
    15·1 answer
  • They begin beating it with a hose to find out what it really means. How does the figurative language in this excerpt reveal Coll
    9·2 answers
  • Your computer has a single hard disk w/ a single volume used by the C:\ drive. You have previously upgraded the disk to a dynami
    6·1 answer
  • Which is the hanging indent on the ruler?
    10·2 answers
  • What is the binary representation of the following hexadecimal numbers?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!