1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shepuryov [24]
3 years ago
8

What are cell phones used for?

Computers and Technology
2 answers:
Pachacha [2.7K]3 years ago
3 0

Answer:

to send and receive text messages, emails, photos and video as well as access the Internet, play games, listen to music, use GPS and more

Explanation:

Olegator [25]3 years ago
3 0
To be able to communicate with people
You might be interested in
Convert the decimal number 164 into the equivalent 8 bit binary number. ​
umka2103 [35]

Answer:

10100100

Explanation:

8 bit system consists of 8 bits or 8 positions and each of them can have binary value (0 or 1).

Each bit is equivalent to a certain power of number 2. Important to know is that you read these bits from right to left.

So, this means that the bit furthest to the right has the value of 2^0, which is 1. The bit to the left has the value of 2^1, which is 2. Next one is 2^2, which is 4 etc. This means that the bit furthest to the left has the value of 2^7, which is 128.

The bit has this potential value only if value 1 if is in its position. If the value is 0 then, regardless of position, value of the bit is 0.

Decimal value of the number is calculated when we add all the values of the bits marked with 1.

So, we're dealing with number 164. We already said that leftmost bit has the value of 128 if it's marked with 1:

1 0 0 0 0 0 0 0 = 128

Next bit has the value of 64, but 128+64 would exceed the value of our number, so the second leftmost bit remains 0.

Next bit has the value of 32, 128+32 is 160, which is less then our number, so we mark the third bit with 1:

1 0 1 0 0 0 0 0 = 160

Similarly, we continue down the line. We only need 4 to reach the value of our number, so we'll mark with 1 the bit that has the value of 4, which leaves us with the solution:

1 0 1 0 0 1 0 0 = 164

7 0
3 years ago
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
lesya692 [45]

Answer:

True

Explanation:

In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key requirements includes certification and accreditation, which is a process that occurs after the system is documented, controls tested, and risk assessment completed. It is required before going live with a major system. Once a system is certified and accredited, responsibility shifts to the owner to operate the system is a true statement.

8 0
3 years ago
How many answers do you need to be able to write messages on here??
Kipish [7]

1,000

Hope this helps!



~Courtney

3 0
3 years ago
What are the two basic categories of film
kati45 [8]
Video and Sound are the 2 most basic categories of film
3 0
3 years ago
¿Por qué es importante aprender a programar?
White raven [17]

Answer:

Es importante aprender a programar, por que es el mismo de que alguen aregle su carro. En estos tiempos, la technolagia se ha convertido en la nueva normal. Va vinir el tiempo quando nosotros necesitamos que arreglar un linia de codigo en nuestras computadoras, y no esta necesario para pagar alguen que ellos lo agan. Como quando necesitas que poner una llanta nueva a tu carro. Tu lo puedes cambiar solo. Entonses como el ejemplo del carro, tu puedes arreglar el linia de codigo en la computadora sin pagar alguen por acerlo.

7 0
3 years ago
Other questions:
  • Which step of creating a financial budget involves listing the payroll, rental, and utility costs?
    10·2 answers
  • Write a Python function merge_dict that takes two dictionaries(d1, d2) as parameters, and returns a modified dictionary(d1) cons
    5·1 answer
  • Does anyone know how to cancel a Pandora Free Trial Subscription? I need to cancel it by tomorrow. Please help!
    12·1 answer
  • What would be the results of the following code? final int SIZE = 25; int[] array1 = new int[SIZE]; … // Code that will put valu
    9·1 answer
  • Perform the following conversions from decimal to binary, octal and hexadecimal systems. a) 1710 b) 132110C) 36010d).7510e).3906
    8·1 answer
  • What is the build in libary function to compare two strings?​
    15·1 answer
  • You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. You notice a significant number
    12·1 answer
  • A(n) ______ has moving mechanical parts, which makes it less reliable than solid-state drives, but its metal platters are sealed
    9·2 answers
  • List 10 examples of computer ethics<br>(please give even 1 if you can, I need it urgently) ​
    10·1 answer
  • The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!