1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kitty [74]
3 years ago
8

Which of the following binary numbers is equivalent to decimal 4?

Computers and Technology
2 answers:
melomori [17]3 years ago
5 0

Answer:

b so easy

Explanation:

Tema [17]3 years ago
5 0

Answer:

B. 100

Explanation:

You might be interested in
Var grades = 88;
ladessa [460]

Answer:

100 times

Explanation:

first value of i in the loop is 0. Last value is 99. So loop never iterates with i at 100.

5 0
3 years ago
SOME PLEASEE HELP!!<br> (has to be 4 paragraphs)
natali 33 [55]

Answer:

Ahhh i wanna help so bad hold on

Explanation:

4 0
2 years ago
Monoculture involves the use of
Serjik [45]
The most extreme form of monoculture involves the cultivation of a single genotype of a crop species, to the exclusion of other genotypes and other species.
4 0
3 years ago
Question 3 5 points)
tangare [24]
Where are the choices?
7 0
3 years ago
Carrell Jackson, the Web developer for Alexander Rocco Corporation, has informed you that Microsoft IIS 6.0 is used for the comp
Jobisdone [24]

Answer:

Case Project 3-2:

Explanation:

Investigating Possible Vulnerabilities of Microsoft IIS 6.0 Carrell Jackson, the Web developer for Alexander Rocco Corporation, has informed you that Microsoft IIS 6.0 is used for the company’s Web site. He’s proud of the direction the Web site is taking and says it has more than 1000 hits per week. Customers can reserve hotel rooms, schedule tee times for golf courses, and make reservations at any of the facility’s many restaurants. Customers can enter their credit card information and receive confirmations via e-mail. Based on this information, write a memo to Mr. Jackson listing any technical cybersecurity alerts or known vulnerabilities of IIS 6.0. If you find vulnerabil- ities, your memo should include recommendations and be written in a way that doesn’t generate fear or uncertainty but encourages prudent decision making.

8 0
3 years ago
Other questions:
  • please help me with the 2 questions above. if you know a lot about game design I have lots more questions!
    5·1 answer
  • You can use a(n) ____ to visually separate related controls from other controls on the form.
    8·1 answer
  • You are configuring two switches of different vendors such that they connect to each other via a single link that will carry mul
    13·1 answer
  • How do you validate the type of text that a user enters?
    7·1 answer
  • Convert each of the following base 10 &amp; base 2 numbers in signed magnitude, one’s complement and two’s complement. Each of t
    8·1 answer
  • Money money money money
    8·2 answers
  • List and describe 3 parts (often referred to as 'elements') of a web page?
    11·1 answer
  • How many times will the loop body execute:
    7·1 answer
  • Relieved to have survived ,henry rolled off the rink________.giving alex a grateful look
    8·1 answer
  • Flash drive / USB is ___________ device. A)Input B)Output C)Internal D)None of these
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!