1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rosijanka [135]
3 years ago
9

Binary digits have only ____ possible value(s

Computers and Technology
1 answer:
Paladinen [302]3 years ago
7 0
2 possible values and they are 0 and 1

You might be interested in
Which of the following is a form of intrapersonal communication?
Citrus2011 [14]
Intrapersonal communication is you are also a sender and receiver within yourself. For example your inner thought, daydream, and private diaries.
7 0
3 years ago
Read 2 more answers
To have the most impact when using email, you should structure your messages so that
ElenaW [278]

Hello Ashley, so basically we all know what email is, but a brief explanation is messages distributed by electronic means from one computer user to one or more recipients via a network. So to use email efficiently (BTW I don't know if this is select all that apply or multiple choice, so I'll do both) you need to have the most important info coming in first. Then, to top that and be an email master, so to speak, you have to bullet and highlight important issues and topics so A, if its multiple choice and A+B if it is select all that apply.

Hope this helped!

6 0
3 years ago
You need to design an online login form in which users have to type their name and password to log into an application. The pass
Elena L [17]
Well, it depends if we are talking about the front end(HTML / Javascript) which grabs the data or are we taking about the back end such as php code or are we talking about the database that stores the password. Either case it is going to be a text/String field of some sort. For instance, the <input> field is going to be a text type but in a form of type="password". On the server side such as php, the code will grab this as a String type and encrypt it. 
7 0
4 years ago
Read 2 more answers
What are the tripleconstraints?
Llana [10]

Answer:

<u>a) Time, Schedule, and Cost</u>

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

The triple constraints are represented by a triangle whose sides are three a different aspects which represent a Quality Project when combined. These three aspects are <u>Time, Schedule (Scope), and Cost</u>. This  model has been used by companies since the 1950's, and is still widely used in today's companies.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
3 years ago
When sketching out your Web site you create a clear and straightforward site map that divides the Web site content into a logica
Elena L [17]

Answer:

Structure.

Explanation:

While drawing the user's site, the simple, as well as concise sitemaps, is created which separates the scope of that site into such a coherent collection for topics & sub-topics.  

So, the Structure concept in website development is regarded while designing a user interface in such a manner which is easily recognizable to the customer.

7 0
4 years ago
Other questions:
  • Which of the following are stages in the computer life cycle? Check all of the boxes that apply.
    13·2 answers
  • What is the difference between a router and a modem
    15·1 answer
  • Typically, when an organization purchases Internet access from an Internet Service Provider (ISP), the ISP will grant it
    5·1 answer
  • Jed is the database administrator for a mid-sized computer component manufacturer. He is responsible for validating the data mod
    12·1 answer
  • ____________ is defined as the set of activities that revolve around a new software product, from its inception to when the prod
    11·1 answer
  • What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier
    14·1 answer
  • _____ can be lost or stolen by cybercriminals. Select 2 options.
    11·2 answers
  • Where does append add the new elements?
    7·1 answer
  • Do you trust machine learning application?
    10·1 answer
  • Andie visits a webpage that features a dancing monkey that changes dance moves when she hovers over it. Which of the following w
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!