1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesnalui [34]
3 years ago
9

What is the language of computers?

Computers and Technology
1 answer:
myrzilka [38]3 years ago
3 0

<em>Answer:</em>

<em>Computers have language of their own. It is called Binary language. </em>

<em>It’s a very simple language with just 2 symbols – 0 and 1. A computer stores all information in the form of 0’s and 1’s.</em>

You might be interested in
In the welding operations of a bicycle manufacturer, a bike frame has a long flow time. The set up for the bike frame is a 7 hou
mestny [16]

Answer:

Bike Frame Flow Time

The value-added percentage of the flow time for this bike frame is:

= 46.

Explanation:

a) Data and Calculations:

Bike Frame Flow Time:

Setup time = 7 hours

Processing time = 6 hours

Storage time = 7 hours

Flow time of the bike frame = 13 hours (7 + 6)

Value-added percentage of the flow time for this bike frame = 6/13 * 100

= 46%

b) Flow time represents the amount of time a bicycle frame spends in the manufacturing process from setup to end.  It is called the total processing time. Unless there is one path through the process, the flow time equals the length of the longest process path.  The storage time is not included in the flow time since it is not a manufacturing process.

8 0
3 years ago
Which option is used to ensure the integrity and authenticity of a Word document but requires additional services to be availabl
mel-nik [20]

Answer:

Digital signature.

Explanation:

Digital signature is used to ensure the integrity and authenticity of a Word document but requires additional services to be available on the internal network.

This is important as it makes sure that the file is authentic and not malware.

3 0
3 years ago
Read 2 more answers
Host A and B are directly connected with a 100 Mbps link. There is one TCP connection between the two hosts, and Host A is sendi
ElenaW [278]

Answer:

Host A and B directly connected to Mbps link.they receive buffer to fill up the fact that Host A will sending in Mbps data faster than B removing the data from it.Once buffer has filled.Host B send a message to Host A to stop sending data then Host B sending a TCP to Host A.Then buffer will fill up again and this process will repeat.

4 0
3 years ago
The piece of hardware that contains the circuitry that processes the information coming into the computer and tells the other ha
Aleksandr-060686 [28]
The central processing unit
6 0
3 years ago
In which text compression technique is it invalid for a bit string that represents a character to be the prefix of any other str
lyudmila [28]

Answer:

Huffman encoding

Explanation:

Huffman code can be regarded as optimal prefix code that is utilized in data compression It should be noted that Huffman encoding is text compression technique that it is invalid for a bit string that represents a character to be the prefix of any other string used to represent a character

5 0
3 years ago
Other questions:
  • Read the description of Mike’s work, and identify his profession. Mike’s job is to record sounds in a studio. He studies a video
    14·2 answers
  • You are troubleshooting a cpu and have already cut power, disconnected the power cable, opened the case, and put on your antista
    6·1 answer
  • If you have long column labels with columns so wide that they affect the readability of a worksheet, you should first
    15·2 answers
  • In Windows 2000 and later, the ____ command shows you the file owner if you have multiple users on the system or network.
    15·1 answer
  • Which internet resource can you use to publicly describe an adventure trip you recently made?
    6·2 answers
  • Write a MATLAB script that prompts the user to input the following array by providing an example in the prompt: [2 4;6 3;5 9]. C
    15·1 answer
  • Write a program that will manipulate Rectangle objects for which you will create a Rectangle class.
    5·1 answer
  • How do I do this? I know the shapes and everything but how do I do b, d, and e?
    7·1 answer
  • What happens when text is added to grouped objects that is larger than an object ?
    9·2 answers
  • According+to+gartner+research,+by+2020,+_____+will+be+the+greatest+source+of+competitive+advantage+for+30%+of+organizations.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!