1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MaRussiya [10]
3 years ago
8

1. Answer the following questions: a. What are the different types of number system? Name them.​

Computers and Technology
1 answer:
BigorU [14]3 years ago
5 0

Answer:

binary,decimal, hexadecimal and octal number system

You might be interested in
Which is an acceptable practice when a photographer shoots in windy conditions?
VARVARA [1.3K]

Answer:

d) attach a bag of weights to the tripod

Explanation:

5 0
3 years ago
What is cloud storage?​
Aleks [24]

Cloud storage is a service model in which data is maintained, managed, backed up remotely and made available to users over a network (typically the Internet).

3 0
3 years ago
You administer a Microsoft SQL Server database that supports a banking transaction management application. You need to retrieve
dusya [7]

Answer:

A, B

Explanation:

A. selects accountholder's ids and check them with those who don't have cities in BranchMaster table.

B. We can use both <em>NOT IN</em><em> </em> as well as <> operator for comparison so it selects accountholder's ids which are not in all of those account holders who have cities in BranchMaster.

5 0
3 years ago
Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?
Scrat [10]

Answer: It depends, but it is definitely a networking attack.

Explanation:

After scanning for vulnerable ports, I could go in a number of different directions. I could initiate a DOS attack by flooding a vulnerable port with requests. I could also initiate a Man-in-the-Middle attack by intercepting their network traffic (usually through port 80(HTTP) if it's not encryped). Because of this, it is highly recommended to use a VPN, so hackers have a harder time getting your data

6 0
3 years ago
30 POINTS!!
bulgar [2K]

Answer:

online

the answer is online

7 0
3 years ago
Other questions:
  • Which key do programmers use to end running programs?
    14·2 answers
  • What will be the topic of the essay?
    14·1 answer
  • The three tasks within data harmonization, namely: data consolidation, data cleansing, and data formatting use techniques called
    8·1 answer
  • Many businesses use robotic solutions. Which department of the food and beverage industry uses robotic solutions on a large scal
    10·2 answers
  • A(n) ____ consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to pe
    6·1 answer
  • Does anyone know the answers?
    8·1 answer
  • How come I haven't moved to the next rank even though I have all of the right things to move on?
    10·2 answers
  • + Use for loop to print numbers from 100 to 10
    11·1 answer
  • F
    9·1 answer
  • Which of the following is a mathematical function defined in the sql standard?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!