1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dem82 [27]
3 years ago
10

01011001 01001111 01010101 01010010 01010100 01001000 01000101 01000010 01010010 01000001 01001001 01000001 01001100 01001001 01

000101 01010011 01010100
if anyone can tell me what the binary code above is you get brainliest
+95 points
Computers and Technology
2 answers:
Marina86 [1]3 years ago
6 0

Answer:

"YOURTHEBRAIALIEST" is the binary code i think

Explanation:

Brrunno [24]3 years ago
4 0

Answer:

YOURTHEBRAIALIEST

Explanation:

HEHE, HIIIIIIII

You might be interested in
Which two sentences uses the colon correctly?
faust18 [17]
You much list something after a colon.
For example
Kaylina's bag included:
Food,Books,Makeup,and a brush.
5 0
3 years ago
Rachelle is writing a program that needs to calculate the cube root of a number. She is not sure how to write the code for that
Dmitriy789 [7]

The cube root is a number multiplied by itself three times to get another number

The code to use is y = x**(1/3)

<h3>How to determine the code to use</h3>

Assume the variable is x, and the cube root of x is y.

So, we have the following equation

y = x^\frac13

In Python, the code to use is y = x**(1/3)

Hence, the code that Rachelle can use in her calculation is x**(1/3)

Read more about cube roots at:

brainly.com/question/365670

3 0
2 years ago
Read 2 more answers
. List 5 types of exploits from cybercrime and provide brief definition. (2.5 Marks)
Flura [38]

In cyber security, an exploit is a way attackers take advantage of certain vulnerabilities and gain malicious access to systems. There are very many types of exploits that exist in the cyber security world. However, I will mention those ones most commonly used.

DoS attacks – The denial of service attacks is very common. Hackers will gain access to servers and send so many packet requests at the same time. The servers become overwhelmed due to too much memory allocation and the huge amount of traffic ends up crashing the servers.

Unauthorized access – When an attacker has an illegal access to host machines

<u>Application Exploitation</u>

Code injection – This exploit can be used to maliciously inject invalid code into an application program or software and as a result change how the program behaves.

Cross-site scripting – Enable hackers inject malicious scripts on a website of a client. Once they have gained access, they will escalate their privileges and have more access to the site.

Clickjacking – A type of attack that tricks unknown victims into clicking links of a web page they believe are legitimate and end up revealing confidential information of themselves.

6 0
4 years ago
How long will the plant have been dead when 87.5 percent of its C-14 has become N-14?
nikdorinn [45]

Answer:

50% - one half life — 5,730 years

25% — two half lifes — 11,460 years

12.5% — three half lifes — 17,190 years

6.25% — four half lifes — 22,920 years

3.125% — five half lifes — 28,650 years

Explanation:

8 0
2 years ago
your teacher has accidentally put the wrong names of the students on her excel science results sheet. What method can be used to
Shtirlitz [24]

Answer:

Explanation:

Excel has a built-in function that allows you to type in a word, letter, or number and it will automatically find every one of that entry and replace it with whatever you want. To do this you simply click on Home > Find & Select > Replace and fill out the information. Once the info is completed click Replace All. This shows exactly why it is way better to do these result sheets on the computer as opposed to on a piece of paper, it allows you to automate everything and fix multiple mistakes with a simple button click.

6 0
3 years ago
Other questions:
  • 5. What would the browser display if the following code were executed in a script?a var product = 0; while ( product &lt;= 25 );
    8·1 answer
  • How many valence electrons are present in the atom of the atomic number of 12?
    10·1 answer
  • Write a program that reads a file containing text. Read each line and send it to the output file, preceded by line numbers. If t
    8·1 answer
  • What is the standard internet protocol, which provides the technical foundation for the public internet?
    9·1 answer
  • How do you activate the Formula AutoComplete function of Excel 2016?
    15·2 answers
  • Radio waves can be used to transmit energy. What is an advantage of this method in computer technology
    7·2 answers
  • Working with do-while loop
    9·1 answer
  • A disk drive has 2000 cylinders, numbered 0 to 1999. The drive is currently servicing a request at cylinder 783, with the previo
    6·1 answer
  • Why is it important to think about the programming language to use?
    6·1 answer
  • A printer is considered to be in the category of
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!