1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
3 years ago
14

How do Computer Scientists use Binary Code?

Computers and Technology
1 answer:
goblinko [34]3 years ago
6 0

Answer:

The digits 1 and 0 used in binary reflect the on and off states of a transistor. ... Each instruction is translated into machine code - simple binary codes that activate the CPU . Programmers write computer code and this is converted by a translator into binary instructions that the processor can execute .

You might be interested in
How to wire two separate switches & lights using the same power source?
Ann [662]
Pull the other end of each cable through the back of the electrical box for the switch<span> that controls it, then strip the end of the cable with a knife and </span>separate<span> the </span><span>wires.

</span>
5 0
3 years ago
I put 100 points in here
tatuchka [14]

Answer:

you only put 50 points not 100

4 0
3 years ago
Networks that are designed to connect similar computers that share data and software with each other are called:_______
sergij07 [2.7K]

Networks that are designed to connect similar computers that share data and software with each other are called: Peer to Peer (P2P) Networks.

<h3>What is a networking software?</h3>

A networking software can be defined as a set of executable instructions (codes) that is typically designed and developed to instruct a networking device on how to perform a specific task or transmit data from one location to another.

<h3>The types of networking software.</h3>

Generally, there are three main types of networking software and these include the following:

  • Security software
  • Connection software
  • Transport software

In Computer networking, Peer to Peer (P2P) Networks can be defined as a type of network that are designed and developed to connect similar computers that share data and software with each other.

Read more on Peer to Peer Networks here: brainly.com/question/1932654

#SPJ1

7 0
2 years ago
8.5 Edhesive Code Practice
Lynna [10]

Answer:

Check explanation

Explanation:

#Print original quote

twainQuotes = ["I have never let my schooling interfere with my education.",

"Get your facts first, and then you can distort them as much as you please.",

"If you tell the truth, you don't have to remember anything.",

"The secret of getting ahead is getting started.",

"Age is an issue of mind over matter. If you don't mind, it doesn't matter. "]

print(twainQuotes)

#Sort and print

twainQuotes.sort()

print(twainQuotes)

#Insertion of quote, sort, then print

twainQuotes.extend(["Courage is resistance to fear, mastery of fear, not absence of fear."])

twainQuotes.sort()

print(twainQuotes)

mark as brainliest pls hehe

8 0
3 years ago
PLEASE HELP
Mrac [35]
1) B                                                                                                                         2) D
3) B
I hope I helped plz make me Brainliest if I'm right :)

8 0
4 years ago
Read 2 more answers
Other questions:
  • HELPPP ASAPP
    8·2 answers
  • Give the 16-bit 2's complement form of the following 8-bit 2's complement numbers: (a) OX94 (b) OXFF (c) OX23 (d) OXBCWhich of t
    7·1 answer
  • A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addr
    6·1 answer
  • Identify the false statement.
    8·1 answer
  • Write a calculator program that keep reading operations and double numbers from user, and print the result based on the chosen o
    6·1 answer
  • Now suppose that the file is broken into 5 packets, each of 10 Mbits. Ignore headers that may be added to these packets. Also ig
    14·1 answer
  • The use of _______________ can validate input responses from clients and prevent certain attack methodologies
    14·1 answer
  • An insulated anti-short fitting required to be installed in the ends of Type AC cable to protect the wires from abrasion is typi
    13·1 answer
  • Need help asap
    5·1 answer
  • Bộ mã I mã hóa được nhiêu kí tự
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!