1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir79 [104]
3 years ago
5

How do I write my name in binary code?

Computers and Technology
1 answer:
Galina-37 [17]3 years ago
4 0

Answer:

qUE

wHAT CODE

Explanation:

You might be interested in
Adjust list by normalizing When analyzing data sets, such as data for human heights or for human weights, a common step is to ad
finlep [7]

Answer:

I've implemented this program using python

userinput = int(input("Length: "))

mylist = []

mylist.append(userinput)

for i in range(1,userinput+1):

   userinp = int(input("Input: "))

   mylist.append(userinp)

smallval = mylist[1]

for i in range(1,len(mylist)):

   if smallval > mylist[i]:

       smallval = mylist[i]

for i in range(1,len(mylist)):

   mylist[i] = mylist[i] - smallval

for i in range(1,len(mylist)):

   print(mylist[i],end=' ')

Explanation:

I've added the full source program as an attachment where I used comments to explain difficult lines

4 0
2 years ago
Suppose you're trying to remove the clamp from a ground strap that's connected to a battery. The clamp won't come loose. Which o
Mekhanik [1.2K]
The answer would be B.
5 0
3 years ago
Read 2 more answers
Erica has always selected large numbers of cells by clicking and dragging her mouse. A shortcut that she could use is to select
labwork [276]
D. enter because if you enter something on a cuputer or laptop your selecting something
5 0
3 years ago
An intruder with malicious intent breaks into an office and steals a hard drive
kakasveta [241]

Answer: data security

Explanation:

The company's authentication protocols and data encryption measures denotes data security.

Data security simply means protecting unauthorized people from having access to a particular data. This is done to prevent unauthorized access of important information or to prevent fraud. Some of the data security measures include data encryption, tokenization, hashing, etc.

4 0
3 years ago
Write the name of the tab, command group, and icon you need to use to access the borders and shading dialog box.
Ilia_Sergeevich [38]

Answer:

Tab: Home Tab

Command group: Paragraph

Icon: Triangle

Explanation:

7 0
3 years ago
Other questions:
  • Which are the best examples of costs that should be considered when creating a project budget?
    11·1 answer
  • What is the order in which windows systems receiving and process multiple gpos?
    7·1 answer
  • Technologies designed to replace operating systems and services when they fail are called what?
    15·1 answer
  • Virtual private network requires a secure remote connections<br><br> true or false?
    11·1 answer
  • What was the ENIAC computer and how was it used/what for?
    9·1 answer
  • Ricardo twists his ankle at work but does not immediately realize that he is injured because his ankle is not sore or swollen, a
    5·1 answer
  • Describe how learning can be accessed in your class?​
    14·1 answer
  • Zachary drinks 2 cups of milk per day. He buys 6 quarts of milk. How many days will his 6 quarts of milk last?
    12·1 answer
  • Please please help I don’t understand
    6·1 answer
  • Write a method to add/subtract two matrices. The header of the method is as follows:
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!