1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mkey [24]
3 years ago
12

Binary numbers are based on __________.

Computers and Technology
2 answers:
Lena [83]3 years ago
8 0
D. Two digits (1s and 0s
yanalaym [24]3 years ago
5 0

Answer: 0 and 1s.

Explanation:

You might be interested in
As a technical support rep, michael is responding to a customer's question sent to him via e-mail. what should michael's first t
hoa [83]

As a technical support rep, Michael's first task will be option b: Determine the purpose of the message he will send as a response.

<h3>Who is a technical support rep?</h3>

The role or duty of a Technical Support is known to be any person that tends to troubleshoot customer tech issues.

Note that they are said to be people who often resolve issues that are linked to computers, phones, tablets, and others.

Therefore, As a technical support rep, Michael's first task will be option b: Determine the purpose of the message he will send as a response.

Learn more about technical support  from

brainly.com/question/27366294
#SPJ1

See option

a. conduct any necessary research

b. determine the purpose of the message he will send as a response

c. Hit the "reply" button

d. start composing his reply

7 0
2 years ago
What can a dimm use to hold data and amplify a signal just before the data is written to the module?
ioda
DIMM stands for Dual In-line Memory Module) .It is a module that contains one or several random access memory (RAM) chips on a small circuit board.
DIMM uses registers to hold data and amplify a signal just before the data is written to the module.<span>Today's DIMMs use a 64-bit data path.</span>
6 0
4 years ago
Question 6 (1 point)
Marysya12 [62]
<h2>answers</h2>

Extranet

wifi create extranet so that our mobile network runs smoothly. it can create lan,wan also

7 0
3 years ago
You are a software engineer at a company where management routinely encourages you and your colleagues to use pirated software.
s2008m [1.1K]

Answer:

That’s highly illegal. You should notify them that it is illegal. And, if they continue, you should notify the legal team. If it continues, you either need to leave the company or notify the proper authorities.

7 0
3 years ago
You can place an insertion point by clicking in the field or by pressing ____.
Slav-nsk [51]
You can place an insertion point by clicking in the field or by clicking F2 keyboard shortcut. Insertion point is usually characterized by a blinking vertical line that allows you to insert a next character that you wanted.
4 0
3 years ago
Other questions:
  • Which of the following typically have the highest auto insurance premiums?
    14·1 answer
  • With arbitrary code execution, the ________________ launches ("spawns") a command shell from which instructions can then be issu
    11·1 answer
  • A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review
    12·1 answer
  • A lamp outside a front door comes on automatically when it is dark, and when someone stands on the doormat outside the front doo
    7·1 answer
  • Chapter 8 discusses five principles for making a graphic clear and understandable. One principle is that the graphic should have
    11·1 answer
  • Give two reasons you should be aware of your computer's system components and their characteristics.
    10·1 answer
  • What are the different types of monitors?
    8·1 answer
  • What are some advantages to having ads tailored to your data?
    15·1 answer
  • If a movie, song, or book is offered for free, is it malware?
    15·1 answer
  • In cryptocurrency, a block is only considered valid if it has a.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!