1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodomira [7]
2 years ago
6

Which of the following is true of binary files?

Computers and Technology
2 answers:
alina1380 [7]2 years ago
3 0
Try using socrative to answer your question it’s really good
natta225 [31]2 years ago
3 0

Answer:A

Explanation:

Edge

You might be interested in
A bit shift is a procedure whereby the bits in a bit string are moved to the left or to the right. For example, we can shift the
Genrish500 [490]

Answer:

Aee explaination

Explanation:

#Implementation of shiftLeft method

#which shifts the bits in its input one

#place to tge left

def shiftLeft(bitstring):

bitstring = bitstring[1:]+bitstring[0]

#return as bit string format

return bitstring

#Get the input from user

bits = input("Enter a string of bits: ")

#call the shiftLeft method which returns the value

# that is stored in leftShift

leftShift = shiftLeft(bits)

#Display the output

print()

print(leftShift)

print()

8 0
3 years ago
One of the disadvantages of cable technology is that:
Artemon [7]

Answer:

The answer is letter C

Explanation:

Systems used by many providers require customers to share bandwidth with neighbors

8 0
2 years ago
Discuss one simple example of hybrid computer.​
andrezito [222]

Answer:

thermometer , petrol pump

5 0
2 years ago
How do you keep word from trying to capitalize every isolated letter "i"
Firdavs [7]
Write "i" the write random words then delete it and add the lowercase i
8 0
2 years ago
Read 2 more answers
How would you "break" a firewall in a laptop computer if you were no longer a administrator? (Cyber Security Related, Computers
4vir4ik [10]
Okay so what you would is press ctrl+alt+delete and click log out i think but if you have a disk put it in and secure everything trust me i am a computer savage. i hack thing all the time.

6 0
2 years ago
Other questions:
  • A text-only forum accessed through a bulletin board service (BBS) is known as a _____.
    14·1 answer
  • What do you believe are the motives of a cyber criminal? Why?
    15·1 answer
  • Consider relations A and B. Relation A represents the entity on the ""one side"" of a one-to-many relationship; Relation B repre
    11·1 answer
  • A parent is browsing through a shopping website, looking for blue-colored striped socks for her child. She is fine if the socks
    15·1 answer
  • MS Excel is a powerful spreadsheet program that helps people with complex mathematical calculations. In what ways could you use
    10·1 answer
  • Discuss the pros and cons of tombstoning versus multitasking. Why do you think Microsoft chose tombstoning?
    11·1 answer
  • How does it transform your ways of socializing
    11·1 answer
  • Drag each tile to the correct box.
    8·1 answer
  • a) consider the binary number 11010010. what is the base-4 representation of (11010010)2? (there is a way to do this without con
    13·1 answer
  • a developer manages an application that interacts with amazon rds. after observing slow performance with read queries, the devel
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!