1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AysviL [449]
3 years ago
8

This help me please. ​

Computers and Technology
1 answer:
MariettaO [177]3 years ago
7 0

Answer:

1) 1011010

2) 1100100

3) 1010101

4) 23

5) 22

6) 24

You might be interested in
Which word or phrase refers to an increasingly common method of computing and storing files?
Alecsey [184]
The answer is Cloud computing
Hope this helps-
3 0
3 years ago
Read 2 more answers
In addition to offering word excel PowerPoint and one note the office home and business edition also offers
algol13

Answer:

Dropbox?

Explanation:

8 0
3 years ago
Uses computer resources from multiple locations to solve a common problem.
Lynna [10]

Answer:

Distributed Computing is used to solve common problem from multiple locations at different locations.

Explanation:

It is the architecture of processor, that is used to combine the different resources of computer from different domain to solve the common problem.

It allows us resource sharing such as hardware and software that are connected to the computer.

Examples

Following are the examples of Distributed computing.

  1. Telecommunication Network
  2. sensor network
  3. banking network

8 0
3 years ago
Convert the following MIPS instruction to its binary and hex representations by doing the following: On first line, type registe
Firdavs [7]

Answer:

To make the group of four we can write 100011 as 00100011

Now, the two groups are:- 0010 and 0011

And 0010 in binary corresponds to 3 in Hexadecimal

And 0011 in binary corresponds to 4 in Hexadecimal.

So, 100011 of binary corresponds to 34 of hex.

3 0
3 years ago
when a sender encrypts a message using their own private key, what security service is being provided to the recipient?
Rudik [331]

asymmetric encryption

4 0
3 years ago
Other questions:
  • This question involves the implementation of the PasswordGenerator class, which generates strings containing initial passwords f
    5·1 answer
  • Which button could Pamela press in the Microsoft Word spell checker to make the word “colour” instantly change to “color” whenev
    11·1 answer
  • Do you agree that digital signatures are the best way to protect the data in question?
    13·1 answer
  • A spreadsheet program is a computerized version of
    8·2 answers
  • You just received a message from the internet which was encrypted with asymmetric encryption. what do you need to do to read the
    12·1 answer
  • How do you put a picture when you ask a question?
    6·2 answers
  • When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo
    11·2 answers
  • ................. are used to summarize data (option) (a) report (b) action ​
    12·2 answers
  • What does a for loop look for in the sequence of data? Check all that apply.
    6·2 answers
  • Which principle or element of layout design is highlighted in this event poster?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!