1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blsea [12.9K]
2 years ago
6

PLEASE HELP AND FAST!!!!!Which of the following devices uses binary code?

Computers and Technology
2 answers:
Ludmilka [50]2 years ago
6 0
I would say A because it makes the most sense
Nastasia [14]2 years ago
5 0
B???......................
You might be interested in
Which of the following bit patterns represents the value -9 in two’s complement notation?
nadya68 [22]

Answer:

B. 11110111

Explanation:

Binary representation of number 9 = 00001001

Binary representation of -9 would involve calculating the twos complement representation of 00001001

First we compute the ones complement of this number by reversing the bits.

00001001 => 11110110

Next we calculate the twos complement representation by adding 1 to the ones complement.

11110110+1 = 11110111

So the final representation is 11110111.

5 0
3 years ago
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
_____ creates a border or space that separates information.
KATRIN_1 [288]
A. Padding
*************
7 0
2 years ago
Which is a software application used to analyze an organization’s data to improve decision making?
Ostrovityanka [42]

The software application used to analyze an organization’s data to improve decision making is said to be Business intelligence software.

<h3>What is Business intelligence?</h3>

Business intelligence is known to be a kind of app that has been set up and it is known to have a set of data analysis applications that has been made to meet a lot of information needs.

Business intelligence are known to be a kind of procedural and technical input that takes , stores, and analyzes the data made by a company's activities.

Learn more about Business intelligence from

brainly.com/question/13339276

3 0
1 year ago
Steve is happy today but he ____ yesterday​
suter [353]

steve is happy today but he wasn't yesterday

3 0
2 years ago
Read 2 more answers
Other questions:
  • WILL MARK BRAINLIEST HELP
    8·2 answers
  • Do you believe that OOP should be phased out and we should start working on some alternative
    6·1 answer
  • An interpreter _______. converts the procedural language one statement at a time converts the source code into machine language
    12·1 answer
  • ____ is another term for document properties.
    12·1 answer
  • Given a int variable named yesCount and another int variable named noCount and an int variable named response write the necessar
    6·1 answer
  • If you decide to get married, a trade-off would be that you have to give up being single.
    12·2 answers
  • A palindrome is a word or phrase that reads the same both backward and forward. The word ""racecar"" is an example. Create an al
    15·1 answer
  • Select the correct answer.
    6·1 answer
  • A technician has just installed a video card in a PC. The video card is not working, althoughit was working fine on the test ben
    6·1 answer
  • If a friend gave a used Wii disc to someone, and they put it in their Wii, could they play it? Nintendo Switch games can only be
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!